diff --git a/go.mod b/go.mod index b69805ef07..13a3d544ea 100644 --- a/go.mod +++ b/go.mod @@ -3,7 +3,7 @@ module github.com/openshift/client-go go 1.16 require ( - github.com/openshift/api v0.0.0-20211025104849-a11323ccb6ea + github.com/openshift/api v0.0.0-20211103080632-8981c8822dfa github.com/spf13/pflag v1.0.5 k8s.io/api v0.22.1 k8s.io/apimachinery v0.22.1 diff --git a/go.sum b/go.sum index 5672130cb2..1eb236d6a1 100644 --- a/go.sum +++ b/go.sum @@ -185,8 +185,8 @@ github.com/onsi/gomega v0.0.0-20170829124025-dcabb60a477c/go.mod h1:C1qb7wdrVGGV github.com/onsi/gomega v1.7.1/go.mod h1:XdKZgCCFLUoM/7CFJVPcG8C1xQ1AJ0vpAezJrB7JYyY= github.com/onsi/gomega v1.10.1 h1:o0+MgICZLuZ7xjH7Vx6zS/zcu93/BEp1VwkIW1mEXCE= github.com/onsi/gomega v1.10.1/go.mod h1:iN09h71vgCQne3DLsj+A5owkum+a2tYe+TOCB1ybHNo= -github.com/openshift/api v0.0.0-20211025104849-a11323ccb6ea h1:aCtko94sKCpceywj0I293WDFXtBJe+/Gg3v5ZuErq+Y= -github.com/openshift/api v0.0.0-20211025104849-a11323ccb6ea/go.mod h1:RsQCVJu4qhUawxxDP7pGlwU3IA4F01wYm3qKEu29Su8= +github.com/openshift/api v0.0.0-20211103080632-8981c8822dfa h1:b0MKH+EOOHNV7Vw96XarOupBiF5ZHgKz8FLu1FC1hy0= +github.com/openshift/api v0.0.0-20211103080632-8981c8822dfa/go.mod h1:RsQCVJu4qhUawxxDP7pGlwU3IA4F01wYm3qKEu29Su8= github.com/openshift/build-machinery-go v0.0.0-20210712174854-1bb7fd1518d3/go.mod h1:b1BuldmJlbA/xYtdZvKi+7j5YGB44qJUJDZ9zwiNCfE= github.com/peterbourgon/diskv v2.0.1+incompatible/go.mod h1:uqqh8zWWbv1HBMNONnaR/tNboyR3/BZd58JJSHlUSCU= github.com/pkg/errors v0.9.1 h1:FEBLx1zS214owpjy7qsBeixbURkuhQAwrK5UwLGTwt4= diff --git a/template/listers/template/v1/expansion_generated.go b/template/listers/template/v1/expansion_generated.go index 851f826072..9ed553b5a5 100644 --- a/template/listers/template/v1/expansion_generated.go +++ b/template/listers/template/v1/expansion_generated.go @@ -6,6 +6,14 @@ package v1 // BrokerTemplateInstanceLister. type BrokerTemplateInstanceListerExpansion interface{} +// TemplateListerExpansion allows custom methods to be added to +// TemplateLister. +type TemplateListerExpansion interface{} + +// TemplateNamespaceListerExpansion allows custom methods to be added to +// TemplateNamespaceLister. +type TemplateNamespaceListerExpansion interface{} + // TemplateInstanceListerExpansion allows custom methods to be added to // TemplateInstanceLister. type TemplateInstanceListerExpansion interface{} diff --git a/template/listers/template/v1/template_expansion.go b/template/listers/template/v1/template_expansion.go deleted file mode 100644 index 3528107a97..0000000000 --- a/template/listers/template/v1/template_expansion.go +++ /dev/null @@ -1,29 +0,0 @@ -package v1 - -import ( - templateapiv1 "github.com/openshift/api/template/v1" - "k8s.io/apimachinery/pkg/api/errors" -) - -const TemplateUIDIndex = "templateuid" - -// TemplateListerExpansion allows custom methods to be added to -// TemplateLister. -type TemplateListerExpansion interface { - GetByUID(uid string) (*templateapiv1.Template, error) -} - -// TemplateNamespaceListerExpansion allows custom methods to be added to -// TemplateNamespaceLister. -type TemplateNamespaceListerExpansion interface{} - -func (s templateLister) GetByUID(uid string) (*templateapiv1.Template, error) { - templates, err := s.indexer.ByIndex(TemplateUIDIndex, uid) - if err != nil { - return nil, err - } - if len(templates) == 0 { - return nil, errors.NewNotFound(templateapiv1.Resource("template"), uid) - } - return templates[0].(*templateapiv1.Template), nil -} diff --git a/vendor/github.com/openshift/api/console/v1alpha1/0000_10_consoleplugin.crd.yaml b/vendor/github.com/openshift/api/console/v1alpha1/0000_10_consoleplugin.crd.yaml index 3df6be0dbf..49c426ecaf 100644 --- a/vendor/github.com/openshift/api/console/v1alpha1/0000_10_consoleplugin.crd.yaml +++ b/vendor/github.com/openshift/api/console/v1alpha1/0000_10_consoleplugin.crd.yaml @@ -39,14 +39,53 @@ spec: description: ConsolePluginSpec is the desired plugin configuration. type: object required: - - displayName - service properties: displayName: description: displayName is the display name of the plugin. type: string + minLength: 1 + proxy: + description: proxy is a list of Services that the plugin needs to connect to. + type: object + properties: + services: + description: "services is a list of in-cluster Services that the plugin will connect to. The Service must use HTTPS. Console backend exposes the following endpoint in order to proxy communication between the plugin and the Service: \n /api/proxy/namespace//service/:/? \n Request example path: \n /api/proxy/namespace/helm/service/helm-charts:8443/releases?limit=10" + type: array + items: + description: ConsolePluginProxyService holds information on Service to which console's backend will proxy the plugin's requests. + type: object + required: + - name + - namespace + - port + properties: + authorize: + description: "authorize indicates if the proxied request will logged-in user's OpenShift access token in the \"Authorization\" request header: \n Authorization: Bearer sha256~kV46hPnEYhCWFnB85r5NrprAxggzgb6GOeLbgcKNsH0 \n By default the access token is not part of the proxied request." + type: boolean + default: false + caCertificate: + description: caCertificate provides the cert authority certificate contents, in case the proxied Service is using custom service CA. By default service CA bundle is used. + type: string + pattern: ^-----BEGIN CERTIFICATE-----([\s\S]*)-----END CERTIFICATE-----\s?$ + name: + description: name of Service that the plugin needs to connect to. + type: string + maxLength: 128 + minLength: 1 + namespace: + description: namespace of Service that the plugin needs to connect to + type: string + maxLength: 128 + minLength: 1 + port: + description: port on which the Service that the plugin needs to connect to is listening on. + type: integer + format: int32 + maximum: 65535 + minimum: 1 service: - description: service is a Kubernetes Service that exposes the plugin using a deployment with an HTTP server. The Service must use HTTPS and service serving certificate. The console backend will proxy the plugins assets from the Service using the service CA bundle. + description: service is a Kubernetes Service that exposes the plugin using a deployment with an HTTP server. The Service must use HTTPS and Service serving certificate. The console backend will proxy the plugins assets from the Service using the service CA bundle. type: object required: - basePath @@ -57,15 +96,24 @@ spec: basePath: description: basePath is the path to the plugin's assets. The primary asset it the manifest file called `plugin-manifest.json`, which is a JSON document that contains metadata about the plugin and the extensions. type: string + default: / + minLength: 1 + pattern: ^/ name: - description: name of Service that is serving the plugin. + description: name of Service that is serving the plugin assets. type: string + maxLength: 128 + minLength: 1 namespace: - description: namespace of Service that is serving the plugin. + description: namespace of Service that is serving the plugin assets. type: string + maxLength: 128 + minLength: 1 port: description: port on which the Service that is serving the plugin is listening to. type: integer format: int32 + maximum: 65535 + minimum: 1 served: true storage: true diff --git a/vendor/github.com/openshift/api/console/v1alpha1/types_console_plugin.go b/vendor/github.com/openshift/api/console/v1alpha1/types_console_plugin.go index 69a0363036..1e3119181a 100644 --- a/vendor/github.com/openshift/api/console/v1alpha1/types_console_plugin.go +++ b/vendor/github.com/openshift/api/console/v1alpha1/types_console_plugin.go @@ -15,32 +15,120 @@ type ConsolePlugin struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata"` + // +kubebuilder:validation:Required + // +required Spec ConsolePluginSpec `json:"spec"` } // ConsolePluginSpec is the desired plugin configuration. type ConsolePluginSpec struct { // displayName is the display name of the plugin. + // +kubebuilder:validation:Required + // +kubebuilder:validation:MinLength=1 + // +optional DisplayName string `json:"displayName"` // service is a Kubernetes Service that exposes the plugin using a // deployment with an HTTP server. The Service must use HTTPS and - // service serving certificate. The console backend will proxy the + // Service serving certificate. The console backend will proxy the // plugins assets from the Service using the service CA bundle. + // +kubebuilder:validation:Required + // +required Service ConsolePluginService `json:"service"` + // proxy is a list of Services that the plugin needs to connect to. + // +kubebuilder:validation:Optional + // +optional + Proxy ConsolePluginProxy `json:"proxy"` } -// ConsolePluginService holds information on service that is serving +// ConsolePluginProxy holds information on various service types +// to which console's backend will proxy the plugin's requests. +type ConsolePluginProxy struct { + // services is a list of in-cluster Services that the plugin + // will connect to. The Service must use HTTPS. Console backend + // exposes the following endpoint in order to proxy communication + // between the plugin and the Service: + // + // /api/proxy/namespace//service/:/? + // + // Request example path: + // + // /api/proxy/namespace/helm/service/helm-charts:8443/releases?limit=10 + // + // +kubebuilder:validation:Optional + // +optional + Services []ConsolePluginProxyService `json:"services"` +} + +// ConsolePluginProxyService holds information on Service to which +// console's backend will proxy the plugin's requests. +type ConsolePluginProxyService struct { + // name of Service that the plugin needs to connect to. + // +kubebuilder:validation:Required + // +kubebuilder:validation:MinLength=1 + // +kubebuilder:validation:MaxLength=128 + // +required + Name string `json:"name"` + // namespace of Service that the plugin needs to connect to + // +kubebuilder:validation:Required + // +kubebuilder:validation:MinLength=1 + // +kubebuilder:validation:MaxLength=128 + // +required + Namespace string `json:"namespace"` + // port on which the Service that the plugin needs to connect to + // is listening on. + // +kubebuilder:validation:Required + // +kubebuilder:validation:Maximum:=65535 + // +kubebuilder:validation:Minimum:=1 + // +required + Port int32 `json:"port"` + // caCertificate provides the cert authority certificate contents, + // in case the proxied Service is using custom service CA. + // By default service CA bundle is used. + // +kubebuilder:validation:Pattern=`^-----BEGIN CERTIFICATE-----([\s\S]*)-----END CERTIFICATE-----\s?$` + // +kubebuilder:validation:Optional + // +optional + CACertificate string `json:"caCertificate"` + // authorize indicates if the proxied request will logged-in user's + // OpenShift access token in the "Authorization" request header: + // + // Authorization: Bearer sha256~kV46hPnEYhCWFnB85r5NrprAxggzgb6GOeLbgcKNsH0 + // + // By default the access token is not part of the proxied request. + // +kubebuilder:default:=false + // +kubebuilder:validation:Optional + // +optional + Authorize bool `json:"authorize"` +} + +// ConsolePluginService holds information on Service that is serving // console dynamic plugin assets. type ConsolePluginService struct { - // name of Service that is serving the plugin. + // name of Service that is serving the plugin assets. + // +kubebuilder:validation:Required + // +kubebuilder:validation:MinLength=1 + // +kubebuilder:validation:MaxLength=128 + // +required Name string `json:"name"` - // namespace of Service that is serving the plugin. + // namespace of Service that is serving the plugin assets. + // +kubebuilder:validation:Required + // +kubebuilder:validation:MinLength=1 + // +kubebuilder:validation:MaxLength=128 + // +required Namespace string `json:"namespace"` // port on which the Service that is serving the plugin is listening to. + // +kubebuilder:validation:Required + // +kubebuilder:validation:Maximum:=65535 + // +kubebuilder:validation:Minimum:=1 + // +required Port int32 `json:"port"` // basePath is the path to the plugin's assets. The primary asset it the // manifest file called `plugin-manifest.json`, which is a JSON document // that contains metadata about the plugin and the extensions. + // +kubebuilder:validation:Required + // +kubebuilder:validation:MinLength=1 + // +kubebuilder:validation:Pattern=`^/` + // +kubebuilder:default:="/" + // +required BasePath string `json:"basePath"` } diff --git a/vendor/github.com/openshift/api/console/v1alpha1/zz_generated.deepcopy.go b/vendor/github.com/openshift/api/console/v1alpha1/zz_generated.deepcopy.go index eb0a6ab33b..6f2327a2d1 100644 --- a/vendor/github.com/openshift/api/console/v1alpha1/zz_generated.deepcopy.go +++ b/vendor/github.com/openshift/api/console/v1alpha1/zz_generated.deepcopy.go @@ -13,7 +13,7 @@ func (in *ConsolePlugin) DeepCopyInto(out *ConsolePlugin) { *out = *in out.TypeMeta = in.TypeMeta in.ObjectMeta.DeepCopyInto(&out.ObjectMeta) - out.Spec = in.Spec + in.Spec.DeepCopyInto(&out.Spec) return } @@ -68,6 +68,43 @@ func (in *ConsolePluginList) DeepCopyObject() runtime.Object { return nil } +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *ConsolePluginProxy) DeepCopyInto(out *ConsolePluginProxy) { + *out = *in + if in.Services != nil { + in, out := &in.Services, &out.Services + *out = make([]ConsolePluginProxyService, len(*in)) + copy(*out, *in) + } + return +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ConsolePluginProxy. +func (in *ConsolePluginProxy) DeepCopy() *ConsolePluginProxy { + if in == nil { + return nil + } + out := new(ConsolePluginProxy) + in.DeepCopyInto(out) + return out +} + +// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. +func (in *ConsolePluginProxyService) DeepCopyInto(out *ConsolePluginProxyService) { + *out = *in + return +} + +// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ConsolePluginProxyService. +func (in *ConsolePluginProxyService) DeepCopy() *ConsolePluginProxyService { + if in == nil { + return nil + } + out := new(ConsolePluginProxyService) + in.DeepCopyInto(out) + return out +} + // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *ConsolePluginService) DeepCopyInto(out *ConsolePluginService) { *out = *in @@ -88,6 +125,7 @@ func (in *ConsolePluginService) DeepCopy() *ConsolePluginService { func (in *ConsolePluginSpec) DeepCopyInto(out *ConsolePluginSpec) { *out = *in out.Service = in.Service + in.Proxy.DeepCopyInto(&out.Proxy) return } diff --git a/vendor/github.com/openshift/api/console/v1alpha1/zz_generated.swagger_doc_generated.go b/vendor/github.com/openshift/api/console/v1alpha1/zz_generated.swagger_doc_generated.go index 78bb81c483..a5186f5a54 100644 --- a/vendor/github.com/openshift/api/console/v1alpha1/zz_generated.swagger_doc_generated.go +++ b/vendor/github.com/openshift/api/console/v1alpha1/zz_generated.swagger_doc_generated.go @@ -27,10 +27,32 @@ func (ConsolePluginList) SwaggerDoc() map[string]string { return map_ConsolePluginList } +var map_ConsolePluginProxy = map[string]string{ + "": "ConsolePluginProxy holds information on various service types to which console's backend will proxy the plugin's requests.", + "services": "services is a list of in-cluster Services that the plugin will connect to. The Service must use HTTPS. Console backend exposes the following endpoint in order to proxy communication between the plugin and the Service:\n\n/api/proxy/namespace//service/:/?\n\nRequest example path:\n\n/api/proxy/namespace/helm/service/helm-charts:8443/releases?limit=10", +} + +func (ConsolePluginProxy) SwaggerDoc() map[string]string { + return map_ConsolePluginProxy +} + +var map_ConsolePluginProxyService = map[string]string{ + "": "ConsolePluginProxyService holds information on Service to which console's backend will proxy the plugin's requests.", + "name": "name of Service that the plugin needs to connect to.", + "namespace": "namespace of Service that the plugin needs to connect to", + "port": "port on which the Service that the plugin needs to connect to is listening on.", + "caCertificate": "caCertificate provides the cert authority certificate contents, in case the proxied Service is using custom service CA. By default service CA bundle is used. ", + "authorize": "authorize indicates if the proxied request will logged-in user's OpenShift access token in the \"Authorization\" request header:\n\nAuthorization: Bearer sha256~kV46hPnEYhCWFnB85r5NrprAxggzgb6GOeLbgcKNsH0\n\nBy default the access token is not part of the proxied request.", +} + +func (ConsolePluginProxyService) SwaggerDoc() map[string]string { + return map_ConsolePluginProxyService +} + var map_ConsolePluginService = map[string]string{ - "": "ConsolePluginService holds information on service that is serving console dynamic plugin assets.", - "name": "name of Service that is serving the plugin.", - "namespace": "namespace of Service that is serving the plugin.", + "": "ConsolePluginService holds information on Service that is serving console dynamic plugin assets.", + "name": "name of Service that is serving the plugin assets.", + "namespace": "namespace of Service that is serving the plugin assets.", "port": "port on which the Service that is serving the plugin is listening to.", "basePath": "basePath is the path to the plugin's assets. The primary asset it the manifest file called `plugin-manifest.json`, which is a JSON document that contains metadata about the plugin and the extensions.", } @@ -42,7 +64,8 @@ func (ConsolePluginService) SwaggerDoc() map[string]string { var map_ConsolePluginSpec = map[string]string{ "": "ConsolePluginSpec is the desired plugin configuration.", "displayName": "displayName is the display name of the plugin.", - "service": "service is a Kubernetes Service that exposes the plugin using a deployment with an HTTP server. The Service must use HTTPS and service serving certificate. The console backend will proxy the plugins assets from the Service using the service CA bundle.", + "service": "service is a Kubernetes Service that exposes the plugin using a deployment with an HTTP server. The Service must use HTTPS and Service serving certificate. The console backend will proxy the plugins assets from the Service using the service CA bundle.", + "proxy": "proxy is a list of Services that the plugin needs to connect to.", } func (ConsolePluginSpec) SwaggerDoc() map[string]string { diff --git a/vendor/github.com/openshift/api/operator/v1/0000_70_dns-operator_00-custom-resource-definition.yaml b/vendor/github.com/openshift/api/operator/v1/0000_70_dns-operator_00-custom-resource-definition.yaml index 52d5021c18..054f908cc3 100644 --- a/vendor/github.com/openshift/api/operator/v1/0000_70_dns-operator_00-custom-resource-definition.yaml +++ b/vendor/github.com/openshift/api/operator/v1/0000_70_dns-operator_00-custom-resource-definition.yaml @@ -38,6 +38,14 @@ spec: description: spec is the specification of the desired behavior of the DNS. type: object properties: + logLevel: + description: 'logLevel describes the desired logging verbosity for CoreDNS. Any one of the following values may be specified: * Normal logs errors from upstream resolvers. * Debug logs errors, NXDOMAIN responses, and NODATA responses. * Trace logs errors and all responses. Setting logLevel: Trace will produce extremely verbose logs. Valid values are: "Normal", "Debug", "Trace". Defaults to "Normal".' + type: string + default: Normal + enum: + - Normal + - Debug + - Trace managementState: description: managementState indicates whether the DNS operator should manage cluster DNS type: string @@ -74,6 +82,14 @@ spec: value: description: Value is the taint value the toleration matches to. If the operator is Exists, the value should be empty, otherwise just a regular string. type: string + operatorLogLevel: + description: 'operatorLogLevel controls the logging level of the DNS Operator. Valid values are: "Normal", "Debug", "Trace". Defaults to "Normal". setting operatorLogLevel: Trace will produce extremely verbose logs.' + type: string + default: Normal + enum: + - Normal + - Debug + - Trace servers: description: "servers is a list of DNS resolvers that provide name query delegation for one or more subdomains outside the scope of the cluster domain. If servers consists of more than one Server, longest suffix match will be used to determine the Server. \n For example, if there are two Servers, one for \"foo.com\" and another for \"a.foo.com\", and the name query is for \"www.a.foo.com\", it will be routed to the Server with Zone \"a.foo.com\". \n If this field is nil, no servers are created." type: array diff --git a/vendor/github.com/openshift/api/operator/v1/types_dns.go b/vendor/github.com/openshift/api/operator/v1/types_dns.go index 51f112c4b6..d73fed96ef 100644 --- a/vendor/github.com/openshift/api/operator/v1/types_dns.go +++ b/vendor/github.com/openshift/api/operator/v1/types_dns.go @@ -70,8 +70,42 @@ type DNSSpec struct { // DNS // +optional ManagementState ManagementState `json:"managementState,omitempty"` + + // operatorLogLevel controls the logging level of the DNS Operator. + // Valid values are: "Normal", "Debug", "Trace". + // Defaults to "Normal". + // setting operatorLogLevel: Trace will produce extremely verbose logs. + // +optional + // +kubebuilder:default=Normal + OperatorLogLevel DNSLogLevel `json:"operatorLogLevel,omitempty"` + + // logLevel describes the desired logging verbosity for CoreDNS. + // Any one of the following values may be specified: + // * Normal logs errors from upstream resolvers. + // * Debug logs errors, NXDOMAIN responses, and NODATA responses. + // * Trace logs errors and all responses. + // Setting logLevel: Trace will produce extremely verbose logs. + // Valid values are: "Normal", "Debug", "Trace". + // Defaults to "Normal". + // +optional + // +kubebuilder:default=Normal + LogLevel DNSLogLevel `json:"logLevel,omitempty"` } +// +kubebuilder:validation:Enum:=Normal;Debug;Trace +type DNSLogLevel string + +var ( + // Normal is the default. Normal, working log information, everything is fine, but helpful notices for auditing or common operations. In kube, this is probably glog=2. + DNSLogLevelNormal DNSLogLevel = "Normal" + + // Debug is used when something went wrong. Even common operations may be logged, and less helpful but more quantity of notices. In kube, this is probably glog=4. + DNSLogLevelDebug DNSLogLevel = "Debug" + + // Trace is used when something went really badly and even more verbose logs are needed. Logging every function call as part of a common operation, to tracing execution of a query. In kube, this is probably glog=6. + DNSLogLevelTrace DNSLogLevel = "Trace" +) + // Server defines the schema for a server that runs per instance of CoreDNS. type Server struct { // name is required and specifies a unique name for the server. Name must comply diff --git a/vendor/github.com/openshift/api/operator/v1/zz_generated.swagger_doc_generated.go b/vendor/github.com/openshift/api/operator/v1/zz_generated.swagger_doc_generated.go index 574c4fd712..95b3fd700c 100644 --- a/vendor/github.com/openshift/api/operator/v1/zz_generated.swagger_doc_generated.go +++ b/vendor/github.com/openshift/api/operator/v1/zz_generated.swagger_doc_generated.go @@ -422,10 +422,12 @@ func (DNSNodePlacement) SwaggerDoc() map[string]string { } var map_DNSSpec = map[string]string{ - "": "DNSSpec is the specification of the desired behavior of the DNS.", - "servers": "servers is a list of DNS resolvers that provide name query delegation for one or more subdomains outside the scope of the cluster domain. If servers consists of more than one Server, longest suffix match will be used to determine the Server.\n\nFor example, if there are two Servers, one for \"foo.com\" and another for \"a.foo.com\", and the name query is for \"www.a.foo.com\", it will be routed to the Server with Zone \"a.foo.com\".\n\nIf this field is nil, no servers are created.", - "nodePlacement": "nodePlacement provides explicit control over the scheduling of DNS pods.\n\nGenerally, it is useful to run a DNS pod on every node so that DNS queries are always handled by a local DNS pod instead of going over the network to a DNS pod on another node. However, security policies may require restricting the placement of DNS pods to specific nodes. For example, if a security policy prohibits pods on arbitrary nodes from communicating with the API, a node selector can be specified to restrict DNS pods to nodes that are permitted to communicate with the API. Conversely, if running DNS pods on nodes with a particular taint is desired, a toleration can be specified for that taint.\n\nIf unset, defaults are used. See nodePlacement for more details.", - "managementState": "managementState indicates whether the DNS operator should manage cluster DNS", + "": "DNSSpec is the specification of the desired behavior of the DNS.", + "servers": "servers is a list of DNS resolvers that provide name query delegation for one or more subdomains outside the scope of the cluster domain. If servers consists of more than one Server, longest suffix match will be used to determine the Server.\n\nFor example, if there are two Servers, one for \"foo.com\" and another for \"a.foo.com\", and the name query is for \"www.a.foo.com\", it will be routed to the Server with Zone \"a.foo.com\".\n\nIf this field is nil, no servers are created.", + "nodePlacement": "nodePlacement provides explicit control over the scheduling of DNS pods.\n\nGenerally, it is useful to run a DNS pod on every node so that DNS queries are always handled by a local DNS pod instead of going over the network to a DNS pod on another node. However, security policies may require restricting the placement of DNS pods to specific nodes. For example, if a security policy prohibits pods on arbitrary nodes from communicating with the API, a node selector can be specified to restrict DNS pods to nodes that are permitted to communicate with the API. Conversely, if running DNS pods on nodes with a particular taint is desired, a toleration can be specified for that taint.\n\nIf unset, defaults are used. See nodePlacement for more details.", + "managementState": "managementState indicates whether the DNS operator should manage cluster DNS", + "operatorLogLevel": "operatorLogLevel controls the logging level of the DNS Operator. Valid values are: \"Normal\", \"Debug\", \"Trace\". Defaults to \"Normal\". setting operatorLogLevel: Trace will produce extremely verbose logs.", + "logLevel": "logLevel describes the desired logging verbosity for CoreDNS. Any one of the following values may be specified: * Normal logs errors from upstream resolvers. * Debug logs errors, NXDOMAIN responses, and NODATA responses. * Trace logs errors and all responses.\n Setting logLevel: Trace will produce extremely verbose logs.\nValid values are: \"Normal\", \"Debug\", \"Trace\". Defaults to \"Normal\".", } func (DNSSpec) SwaggerDoc() map[string]string { diff --git a/vendor/modules.txt b/vendor/modules.txt index db00514ccb..169502ac10 100644 --- a/vendor/modules.txt +++ b/vendor/modules.txt @@ -53,7 +53,7 @@ github.com/mailru/easyjson/jwriter github.com/modern-go/concurrent # github.com/modern-go/reflect2 v1.0.1 github.com/modern-go/reflect2 -# github.com/openshift/api v0.0.0-20211025104849-a11323ccb6ea +# github.com/openshift/api v0.0.0-20211103080632-8981c8822dfa ## explicit github.com/openshift/api/apiserver/v1 github.com/openshift/api/apps/v1