mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-09 16:00:22 +00:00
rebase: update github.com/ceph/ceph-csi to latest version
Signed-off-by: Niels de Vos <ndevos@ibm.com>
This commit is contained in:
parent
88ed4a12cc
commit
dee73e78af
2
go.mod
2
go.mod
@ -123,7 +123,7 @@ require (
|
||||
github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f // indirect
|
||||
github.com/opencontainers/go-digest v1.0.0 // indirect
|
||||
github.com/opencontainers/selinux v1.11.0 // indirect
|
||||
github.com/openshift/api v0.0.0-20230320192226-1fc631efd341 // indirect
|
||||
github.com/openshift/api v0.0.0-20240115183315-0793e918179d // indirect
|
||||
github.com/pkg/errors v0.9.1 // indirect
|
||||
github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 // indirect
|
||||
github.com/prometheus/client_model v0.5.0 // indirect
|
||||
|
4
go.sum
4
go.sum
@ -1451,8 +1451,8 @@ github.com/opencontainers/go-digest v1.0.0/go.mod h1:0JzlMkj0TRzQZfJkVvzbP0HBR3I
|
||||
github.com/opencontainers/selinux v1.11.0 h1:+5Zbo97w3Lbmb3PeqQtpmTkMwsW5nRI3YaLpt7tQ7oU=
|
||||
github.com/opencontainers/selinux v1.11.0/go.mod h1:E5dMC3VPuVvVHDYmi78qvhJp8+M586T4DlDRYpFkyec=
|
||||
github.com/openshift/api v0.0.0-20210105115604-44119421ec6b/go.mod h1:aqU5Cq+kqKKPbDMqxo9FojgDeSpNJI7iuskjXjtojDg=
|
||||
github.com/openshift/api v0.0.0-20230320192226-1fc631efd341 h1:PhLdiIlVqgN4frwrG8lNlbQdJ4eJcGdjX/vhlN6xupk=
|
||||
github.com/openshift/api v0.0.0-20230320192226-1fc631efd341/go.mod h1:ctXNyWanKEjGj8sss1KjjHQ3ENKFm33FFnS5BKaIPh4=
|
||||
github.com/openshift/api v0.0.0-20240115183315-0793e918179d h1:gtwDqGPf5QmsV8jvOUoDNbtyeby9QeLdsybNQ8mGqHQ=
|
||||
github.com/openshift/api v0.0.0-20240115183315-0793e918179d/go.mod h1:CxgbWAlvu2iQB0UmKTtRu1YfepRg1/vJ64n2DlIEVz4=
|
||||
github.com/openshift/build-machinery-go v0.0.0-20200917070002-f171684f77ab/go.mod h1:b1BuldmJlbA/xYtdZvKi+7j5YGB44qJUJDZ9zwiNCfE=
|
||||
github.com/openshift/client-go v0.0.0-20210112165513-ebc401615f47/go.mod h1:u7NRAjtYVAKokiI9LouzTv4mhds8P4S1TwdVAfbjKSk=
|
||||
github.com/opentracing/opentracing-go v1.1.0/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o=
|
||||
|
20
vendor/github.com/ceph/ceph-csi/api/deploy/kubernetes/cephfs/doc.go
generated
vendored
Normal file
20
vendor/github.com/ceph/ceph-csi/api/deploy/kubernetes/cephfs/doc.go
generated
vendored
Normal file
@ -0,0 +1,20 @@
|
||||
/*
|
||||
Copyright 2024 The Ceph-CSI Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
// Package cephfs contains functions to obtain standard and recommended
|
||||
// deployment artifacts for the CephFS CSI-driver on Kubernetes. These
|
||||
// artifacts can be used by automation tools that want to deploy Ceph-CSI.
|
||||
package cephfs
|
20
vendor/github.com/ceph/ceph-csi/api/deploy/kubernetes/nfs/doc.go
generated
vendored
Normal file
20
vendor/github.com/ceph/ceph-csi/api/deploy/kubernetes/nfs/doc.go
generated
vendored
Normal file
@ -0,0 +1,20 @@
|
||||
/*
|
||||
Copyright 2021 The Ceph-CSI Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
// Package nfs contains functions to obtain standard and recommended deployment
|
||||
// artifacts for the NFS CSI-driver on Kubernetes. These artifacts can be used
|
||||
// by automation tools that want to deploy Ceph-CSI.
|
||||
package nfs
|
20
vendor/github.com/ceph/ceph-csi/api/deploy/kubernetes/rbd/doc.go
generated
vendored
Normal file
20
vendor/github.com/ceph/ceph-csi/api/deploy/kubernetes/rbd/doc.go
generated
vendored
Normal file
@ -0,0 +1,20 @@
|
||||
/*
|
||||
Copyright 2021 The Ceph-CSI Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
// Package rbd contains functions to obtain standard and recommended deployment
|
||||
// artifacts for the RBD CSI-driver on Kubernetes. These artifacts can be used
|
||||
// by automation tools that want to deploy Ceph-CSI.
|
||||
package rbd
|
3
vendor/github.com/openshift/api/security/v1/consts.go
generated
vendored
3
vendor/github.com/openshift/api/security/v1/consts.go
generated
vendored
@ -7,4 +7,7 @@ const (
|
||||
SupplementalGroupsAnnotation = "openshift.io/sa.scc.supplemental-groups"
|
||||
MCSAnnotation = "openshift.io/sa.scc.mcs"
|
||||
ValidatedSCCAnnotation = "openshift.io/scc"
|
||||
// This annotation pins required SCCs for core OpenShift workloads to prevent preemption of custom SCCs.
|
||||
// It is being used in the SCC admission plugin.
|
||||
RequiredSCCAnnotation = "openshift.io/required-scc"
|
||||
)
|
||||
|
8
vendor/github.com/openshift/api/security/v1/generated.proto
generated
vendored
8
vendor/github.com/openshift/api/security/v1/generated.proto
generated
vendored
@ -137,6 +137,8 @@ message PodSecurityPolicySubjectReviewStatus {
|
||||
// Compatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.
|
||||
// +openshift:compatibility-gen:level=4
|
||||
message RangeAllocation {
|
||||
// metadata is the standard object's metadata.
|
||||
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
|
||||
|
||||
// range is a string representing a unique label for a range of uids, "1000000000-2000000000/10000".
|
||||
@ -152,6 +154,8 @@ message RangeAllocation {
|
||||
// Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
|
||||
// +openshift:compatibility-gen:level=1
|
||||
message RangeAllocationList {
|
||||
// metadata is the standard list's metadata.
|
||||
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
||||
|
||||
// List of RangeAllocations.
|
||||
@ -203,6 +207,8 @@ message SELinuxContextStrategyOptions {
|
||||
// +kubebuilder:singular=securitycontextconstraint
|
||||
// +openshift:compatibility-gen:level=1
|
||||
message SecurityContextConstraints {
|
||||
// metadata is the standard object's metadata.
|
||||
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
|
||||
|
||||
// Priority influences the sort order of SCCs when evaluating which SCCs to try first for
|
||||
@ -346,6 +352,8 @@ message SecurityContextConstraints {
|
||||
// Compatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).
|
||||
// +openshift:compatibility-gen:level=1
|
||||
message SecurityContextConstraintsList {
|
||||
// metadata is the standard list's metadata.
|
||||
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
||||
|
||||
// List of security context constraints.
|
||||
|
12
vendor/github.com/openshift/api/security/v1/types.go
generated
vendored
12
vendor/github.com/openshift/api/security/v1/types.go
generated
vendored
@ -35,6 +35,9 @@ var AllowAllCapabilities corev1.Capability = "*"
|
||||
// +openshift:compatibility-gen:level=1
|
||||
type SecurityContextConstraints struct {
|
||||
metav1.TypeMeta `json:",inline"`
|
||||
|
||||
// metadata is the standard object's metadata.
|
||||
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// Priority influences the sort order of SCCs when evaluating which SCCs to try first for
|
||||
@ -295,6 +298,9 @@ const (
|
||||
// +openshift:compatibility-gen:level=1
|
||||
type SecurityContextConstraintsList struct {
|
||||
metav1.TypeMeta `json:",inline"`
|
||||
|
||||
// metadata is the standard list's metadata.
|
||||
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// List of security context constraints.
|
||||
@ -431,6 +437,9 @@ type ServiceAccountPodSecurityPolicyReviewStatus struct {
|
||||
// +openshift:compatibility-gen:level=4
|
||||
type RangeAllocation struct {
|
||||
metav1.TypeMeta `json:",inline"`
|
||||
|
||||
// metadata is the standard object's metadata.
|
||||
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// range is a string representing a unique label for a range of uids, "1000000000-2000000000/10000".
|
||||
@ -449,6 +458,9 @@ type RangeAllocation struct {
|
||||
// +openshift:compatibility-gen:level=1
|
||||
type RangeAllocationList struct {
|
||||
metav1.TypeMeta `json:",inline"`
|
||||
|
||||
// metadata is the standard list's metadata.
|
||||
// More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata
|
||||
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||
|
||||
// List of RangeAllocations.
|
||||
|
4
vendor/github.com/openshift/api/security/v1/zz_generated.swagger_doc_generated.go
generated
vendored
4
vendor/github.com/openshift/api/security/v1/zz_generated.swagger_doc_generated.go
generated
vendored
@ -122,6 +122,7 @@ func (PodSecurityPolicySubjectReviewStatus) SwaggerDoc() map[string]string {
|
||||
|
||||
var map_RangeAllocation = map[string]string{
|
||||
"": "RangeAllocation is used so we can easily expose a RangeAllocation typed for security group\n\nCompatibility level 4: No compatibility is provided, the API can change at any point for any reason. These capabilities should not be used by applications needing long term support.",
|
||||
"metadata": "metadata is the standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata",
|
||||
"range": "range is a string representing a unique label for a range of uids, \"1000000000-2000000000/10000\".",
|
||||
"data": "data is a byte array representing the serialized state of a range allocation. It is a bitmap with each bit set to one to represent a range is taken.",
|
||||
}
|
||||
@ -132,6 +133,7 @@ func (RangeAllocation) SwaggerDoc() map[string]string {
|
||||
|
||||
var map_RangeAllocationList = map[string]string{
|
||||
"": "RangeAllocationList is a list of RangeAllocations objects\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
|
||||
"metadata": "metadata is the standard list's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata",
|
||||
"items": "List of RangeAllocations.",
|
||||
}
|
||||
|
||||
@ -163,6 +165,7 @@ func (SELinuxContextStrategyOptions) SwaggerDoc() map[string]string {
|
||||
|
||||
var map_SecurityContextConstraints = map[string]string{
|
||||
"": "SecurityContextConstraints governs the ability to make requests that affect the SecurityContext that will be applied to a container. For historical reasons SCC was exposed under the core Kubernetes API group. That exposure is deprecated and will be removed in a future release - users should instead use the security.openshift.io group to manage SecurityContextConstraints.\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
|
||||
"metadata": "metadata is the standard object's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata",
|
||||
"priority": "Priority influences the sort order of SCCs when evaluating which SCCs to try first for a given pod request based on access in the Users and Groups fields. The higher the int, the higher priority. An unset value is considered a 0 priority. If scores for multiple SCCs are equal they will be sorted from most restrictive to least restrictive. If both priorities and restrictions are equal the SCCs will be sorted by name.",
|
||||
"allowPrivilegedContainer": "AllowPrivilegedContainer determines if a container can request to be run as privileged.",
|
||||
"defaultAddCapabilities": "DefaultAddCapabilities is the default set of capabilities that will be added to the container unless the pod spec specifically drops the capability. You may not list a capabiility in both DefaultAddCapabilities and RequiredDropCapabilities.",
|
||||
@ -195,6 +198,7 @@ func (SecurityContextConstraints) SwaggerDoc() map[string]string {
|
||||
|
||||
var map_SecurityContextConstraintsList = map[string]string{
|
||||
"": "SecurityContextConstraintsList is a list of SecurityContextConstraints objects\n\nCompatibility level 1: Stable within a major release for a minimum of 12 months or 3 minor releases (whichever is longer).",
|
||||
"metadata": "metadata is the standard list's metadata. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#metadata",
|
||||
"items": "List of security context constraints.",
|
||||
}
|
||||
|
||||
|
6
vendor/modules.txt
vendored
6
vendor/modules.txt
vendored
@ -134,7 +134,7 @@ github.com/cenkalti/backoff/v3
|
||||
## explicit; go 1.18
|
||||
github.com/cenkalti/backoff/v4
|
||||
# github.com/ceph/ceph-csi/api v0.0.0-00010101000000-000000000000 => ./api
|
||||
## explicit; go 1.18
|
||||
## explicit; go 1.21
|
||||
github.com/ceph/ceph-csi/api/deploy/kubernetes
|
||||
github.com/ceph/ceph-csi/api/deploy/kubernetes/cephfs
|
||||
github.com/ceph/ceph-csi/api/deploy/kubernetes/nfs
|
||||
@ -490,8 +490,8 @@ github.com/opencontainers/go-digest
|
||||
github.com/opencontainers/selinux/go-selinux
|
||||
github.com/opencontainers/selinux/go-selinux/label
|
||||
github.com/opencontainers/selinux/pkg/pwalkdir
|
||||
# github.com/openshift/api v0.0.0-20230320192226-1fc631efd341
|
||||
## explicit; go 1.19
|
||||
# github.com/openshift/api v0.0.0-20240115183315-0793e918179d
|
||||
## explicit; go 1.21
|
||||
github.com/openshift/api/security/v1
|
||||
# github.com/pkg/errors v0.9.1
|
||||
## explicit
|
||||
|
Loading…
Reference in New Issue
Block a user