Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

1.8.4 rebase #47

Merged
merged 78 commits into from
Dec 15, 2017
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
78 commits
Select commit Hold shift + click to select a range
a9e045d
UPSTREAM: 53442: add nested encoder and decoder to admission config
deads2k Oct 4, 2017
54f6362
UPSTREAM: 53731: Use locks in fake dbus
smarterclayton Oct 11, 2017
8a24429
UPSTREAM: <carry>: reallow the ability to post across namespaces in api
pweil- Aug 11, 2015
08399a0
UPSTREAM: <carry>: add kubelet timeouts
soltysh Dec 21, 2015
d93eb99
UPSTREAM: <carry>: Tolerate node ExternalID changes with no cloud pro…
DirectXMan12 Jan 12, 2016
6ebdf2a
UPSTREAM: <carry>: Add our types to kubectl get error
Nov 18, 2016
5cf278c
UPSTREAM: <carry>: Allow overriding default generators for run
liggitt Mar 16, 2016
9ed0b41
UPSTREAM: <carry>: force import ordering for stable codegen
Nov 18, 2016
d39b069
UPSTREAM: <carry>: add service serving cert signer to token controller
deads2k May 26, 2016
d97488e
UPSTREAM: <carry>: fix fifo resync, remove after FIFO is dead
deads2k Jul 14, 2016
d5805a5
UPSTREAM: <carry>: Disable file locking in clientcmd
smarterclayton Sep 13, 2016
d7f6486
UPSTREAM: <carry>: Disable e2e pre-check on scheduler predicates
Nov 28, 2016
dd107ae
UPSTREAM: <drop>: merge multiple registrations for the same group
deads2k Feb 1, 2016
b240a6b
UPSTREAM: <carry>: Double container probe timeout
smarterclayton Jan 16, 2017
0064370
UPSTREAM: <carry>: Increase service endpoint test timeout
smarterclayton Jan 16, 2017
52ef948
UPSTREAM: <carry>: Pod deletion can be contended, causing test failure
smarterclayton Jan 17, 2017
fb9d85c
UPSTREAM: 00000: make AsVersionedObjects default cleanly
deads2k Apr 25, 2017
d5ec5b3
UPSTREAM: 00000: disambiguate operation names for legacy discovery
deads2k Jun 7, 2017
a59f230
UPSTREAM: 47347: actually check for a live discovery endpoint before …
deads2k Jun 12, 2017
5403b0d
UPSTREAM: <carry>: commit generated openapi
deads2k Jul 24, 2017
0cee52c
UPSTREAM: 49131: expose direct from config new scheduler method
deads2k Jul 6, 2017
d44a7f3
UPSTREAM: <carry>: make wiring in kubeproxy easy until we sort out co…
deads2k Jul 10, 2017
f8a2d02
UPSTREAM: <carry>: compensate for poor printer behavior
deads2k Jul 11, 2017
748eece
UPSTREAM: <carry>: increase wait in kubecontrollers
deads2k Jul 10, 2017
cc78573
UPSTREAM: <carry>: add patch to allow shimming SCC
deads2k Jun 15, 2017
1a4fa81
UPSTREAM: 48884: Do not mutate pods on update
smarterclayton Jul 13, 2017
ffd1763
UPSTREAM: 49312: allow the /version endpoint to pass through
deads2k Jul 20, 2017
51f05b3
UPSTREAM: <carry>: increase timeout in TestCancelAndReadd even more
soltysh Sep 18, 2017
2dd69bc
UPSTREAM: <carry>: allow a filter function on admission registration
deads2k Oct 2, 2017
01f114a
UPSTREAM: 53318: create separate transports for liveness and readines…
sjenning Oct 2, 2017
66fa72c
UPSTREAM: 47806: kubelet: fix inconsistent display of terminated pod …
dcbw Jun 20, 2017
6a6ffb4
UPSTREAM: <carry>: ignored namespace lifecycle resources
deads2k Jun 14, 2017
beddf38
UPSTREAM: <carry>: openapi generation for createNamespacedDeploymentC…
soltysh Oct 2, 2017
1737831
UPSTREAM: <carry>: allow controller context injection to share informers
deads2k Sep 7, 2017
e7702b7
UPSTREAM: <carry>: Fix to avoid REST API calls at log level 2
mfojtik Oct 16, 2017
2ee9e17
UPSTREAM: <carry>: Do not error out on pods in kube-system
smarterclayton Jul 27, 2017
707e9c3
UPSTREAM: 53037: Verify client cert before reusing existing bootstrap
jcbsmpsn Aug 16, 2017
c3e2ee4
UPSTREAM: <carry>: update clientset generator for openshift groups
mfojtik Oct 23, 2017
4d62391
UPSTREAM: 53857: kubelet sync pod throws more detailed events
joelsmith Oct 13, 2017
15e3ba7
UPSTREAM: 52673: default service resolver for webhook admission
deads2k Oct 12, 2017
910fcc3
UPSTREAM: 53823: allow fail close webhook admission
deads2k Oct 12, 2017
d77c228
UPSTREAM: 53896: decode admission responses into a fresh object
deads2k Oct 13, 2017
cc1484b
UPSTREAM: <drop>: drop in 1.9 rebase. Shims enough admission webhook …
deads2k Oct 13, 2017
733713a
UPSTREAM: 53464: output empty creationTimestamps as null
juanvallejo Oct 4, 2017
e243b7b
UPSTREAM: 51750: output `<none>` for colums not found
juanvallejo Oct 24, 2017
34ef670
UPSTREAM: <drop>: add origin resource shortcuts to kube shortcut rest…
Dec 19, 2016
6665e46
UPSTREAM: 54763: make iptables wait flag generic; increase the max wa…
Oct 29, 2017
2fe8263
UPSTREAM: 54812: Allow override of cluster level (default, whitelist)…
Oct 30, 2017
1a62890
UPSTREAM: 55028: kubelet: dockershim: remove orphaned checkpoint files
sjenning Nov 2, 2017
080191d
UPSTREAM: 54979: When cert dir is relative, cert rotation builds inco…
smarterclayton Nov 2, 2017
d7a964f
UPSTREAM: 52503: Get fallback termination msg from docker when using …
joelsmith Sep 14, 2017
ea0dbe1
UPSTREAM: 55223: Fix protobuf generator for aliases to repeated types
mfojtik Nov 7, 2017
a3f73c1
UPSTREAM: 53401: Fix spam of multiattach errors in event logs
gnufied Oct 3, 2017
4695904
UPSTREAM: 53682: Make sure we use rwlocks not just RLock
gnufied Oct 10, 2017
7d11795
UPSTREAM: 53831: Fix volume reconciler test flake
gnufied Oct 13, 2017
e181347
UPSTREAM: 53606: implement ApproximatePodTemplateObject upstream
juanvallejo Sep 18, 2017
626dddb
UPSTREAM: <drop>: get.go doesn't handle metav1.Status returned by res…
mfojtik Nov 9, 2017
c1d8af9
UPSTREAM: 55248: increase iptables max wait from 2 seconds to 5 (fix)
knobunc Nov 7, 2017
af7d330
UPSTREAM: 55704: Return original error instead of negotiation one
soltysh Nov 14, 2017
1278104
UPSTREAM: 56367: Use full gopath for externalTypes
soltysh Nov 14, 2017
021d92e
UPSTREAM: 55772: Only attempt to construct GC informers for watchable…
liggitt Nov 15, 2017
be214c7
UPSTREAM: 55974: Allow constructing spdy executor from existing trans…
liggitt Nov 17, 2017
4b843b0
UPSTREAM: <carry>: switch back to use ugorji/go to avoid deserializat…
mfojtik Oct 30, 2017
9c6df7e
UPSTREAM: <drop>: disable flaky InitFederation unit test
deads2k Jul 14, 2017
04ba547
UPSTREAM: <carry>: disable failing etcd test for old level
deads2k Nov 21, 2017
b30f1be
UPSTREAM: 55796: Correct ConstructVolumeSpec()
humblec Nov 22, 2017
eeabd42
UPSTREAM: 56045: Fix getting logs from daemonset
mfojtik Nov 20, 2017
68ee5dd
UPSTREAM: 53135: Fixed counting of unbound PVCs towards limit of atta…
jsafrane Nov 23, 2017
c604bb9
UPSTREAM: 53989: Remove repeated random string generations in schedul…
jsafrane Nov 23, 2017
3943aab
UPSTREAM: 55641: dockershim: remove corrupt checkpoints immediately u…
sjenning Nov 14, 2017
a054249
UPSTREAM: 55631: Parse and return the last line in the log even if it…
runcom Nov 6, 2017
df0eb54
UPSTREAM: 56503: MustRunAsNonRoot should reject a pod if it has non-n…
php-coder Nov 29, 2017
6602fbe
UPSTREAM: 56356: Wait for controllerrevision informer to sync on stat…
tnozicka Nov 29, 2017
311cdd4
UPSTREAM: 54597: kubelet: check for illegal container state transition
tnozicka Nov 29, 2017
557e173
UPSTREAM: <drop>: generated files
liggitt Nov 28, 2017
7f4757a
UPSTREAM: <carry>: allow multiple containers to union for swagger
soltysh Oct 24, 2017
0c298c7
UPSTREAM: <drop>: etcd testing
soltysh Oct 26, 2017
7618833
sync([email protected]:/openshift/origin.git): a050d411d8fe01a4216723cff…
liggitt Dec 15, 2017
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 0 additions & 3 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -110,12 +110,9 @@ kubernetes.tar.gz
# generated files in any directory
# TODO(thockin): uncomment this when we stop committing the generated files.
#zz_generated.*
zz_generated.openapi.go

# make-related metadata
/.make/
# Just in time generated data in the source, should never be commited
/test/e2e/generated/bindata.go

# This file used by some vendor repos (e.g. github.com/go-openapi/...) to store secret variables and should not be ignored
!\.drone\.sec
Expand Down
16 changes: 11 additions & 5 deletions cmd/kube-controller-manager/app/controllermanager.go
Original file line number Diff line number Diff line change
Expand Up @@ -122,7 +122,9 @@ func Run(s *options.CMServer) error {
return err
}

go startHTTP(s)
if s.Port >= 0 {
go startHTTP(s)
}

recorder := createRecorder(kubeClient)

Expand Down Expand Up @@ -156,7 +158,11 @@ func Run(s *options.CMServer) error {
glog.Fatalf("error starting controllers: %v", err)
}

ctx.InformerFactory.Start(ctx.Stop)
if StartInformers == nil {
ctx.InformerFactory.Start(ctx.Stop)
} else {
StartInformers(ctx.Stop)
}
close(ctx.InformersStarted)

select {}
Expand Down Expand Up @@ -371,7 +377,7 @@ func GetAvailableResources(clientBuilder controller.ControllerClientBuilder) (ma
var healthzContent string
// If apiserver is not running we should wait for some time and fail only then. This is particularly
// important when we start apiserver and controller manager at the same time.
err := wait.PollImmediate(time.Second, 10*time.Second, func() (bool, error) {
err := wait.PollImmediate(time.Second, 5*time.Minute, func() (bool, error) {
client, err := clientBuilder.Client("controller-discovery")
if err != nil {
glog.Errorf("Failed to get api versions from server: %v", err)
Expand Down Expand Up @@ -416,10 +422,10 @@ func GetAvailableResources(clientBuilder controller.ControllerClientBuilder) (ma
return allResources, nil
}

// CreateControllerContext creates a context struct containing references to resources needed by the
// createControllerContext creates a context struct containing references to resources needed by the
// controllers such as the cloud provider and clientBuilder. rootClientBuilder is only used for
// the shared-informers client and token controller.
func CreateControllerContext(s *options.CMServer, rootClientBuilder, clientBuilder controller.ControllerClientBuilder, stop <-chan struct{}) (ControllerContext, error) {
func createControllerContext(s *options.CMServer, rootClientBuilder, clientBuilder controller.ControllerClientBuilder, stop <-chan struct{}) (ControllerContext, error) {
versionedClient := rootClientBuilder.ClientOrDie("shared-informers")
sharedInformers := informers.NewSharedInformerFactory(versionedClient, ResyncPeriod(s)())

Expand Down
12 changes: 12 additions & 0 deletions cmd/kube-controller-manager/app/patch.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
package app

import (
"k8s.io/kubernetes/cmd/kube-controller-manager/app/options"
"k8s.io/kubernetes/pkg/controller"
)

// This allows overriding from inside the same process. It's not pretty, but its fairly easy to maintain because conflicts are small.
var CreateControllerContext func(s *options.CMServer, rootClientBuilder, clientBuilder controller.ControllerClientBuilder, stop <-chan struct{}) (ControllerContext, error) = createControllerContext

// StartInformers allows overriding inside of the same process.
var StartInformers func(stop <-chan struct{}) = nil
15 changes: 15 additions & 0 deletions cmd/kube-proxy/app/server_patch.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
package app

import (
"github.com/spf13/pflag"

"k8s.io/kubernetes/pkg/apis/componentconfig"
)

func (o *Options) GetConfig() *componentconfig.KubeProxyConfiguration {
return o.config
}

func (o *Options) AddFlags(fs *pflag.FlagSet) {
AddFlags(o, fs)
}
2 changes: 1 addition & 1 deletion cmd/kubeadm/app/node/csr.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,8 +22,8 @@ import (
"k8s.io/apimachinery/pkg/types"
clientcmdapi "k8s.io/client-go/tools/clientcmd/api"
certutil "k8s.io/client-go/util/cert"
"k8s.io/client-go/util/certificate/csr"
kubeconfigutil "k8s.io/kubernetes/cmd/kubeadm/app/util/kubeconfig"
"k8s.io/kubernetes/pkg/kubelet/util/csr"
)

// CSRContextAndUser defines the context to use for the client certs in the kubelet kubeconfig file
Expand Down
1 change: 1 addition & 0 deletions cmd/kubelet/app/BUILD
Original file line number Diff line number Diff line change
Expand Up @@ -121,6 +121,7 @@ go_library(
"//vendor/k8s.io/client-go/tools/clientcmd:go_default_library",
"//vendor/k8s.io/client-go/tools/record:go_default_library",
"//vendor/k8s.io/client-go/util/cert:go_default_library",
"//vendor/k8s.io/client-go/util/certificate:go_default_library",
] + select({
"@io_bazel_rules_go//go/platform:linux_amd64": [
"//vendor/golang.org/x/exp/inotify:go_default_library",
Expand Down
9 changes: 6 additions & 3 deletions cmd/kubelet/app/server.go
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,7 @@ import (
"k8s.io/client-go/tools/clientcmd"
"k8s.io/client-go/tools/record"
certutil "k8s.io/client-go/util/cert"
"k8s.io/client-go/util/certificate"
"k8s.io/kubernetes/cmd/kubelet/app/options"
"k8s.io/kubernetes/pkg/api"
"k8s.io/kubernetes/pkg/capabilities"
Expand All @@ -64,7 +65,7 @@ import (
kubeletscheme "k8s.io/kubernetes/pkg/kubelet/apis/kubeletconfig/scheme"
kubeletconfigv1alpha1 "k8s.io/kubernetes/pkg/kubelet/apis/kubeletconfig/v1alpha1"
"k8s.io/kubernetes/pkg/kubelet/cadvisor"
"k8s.io/kubernetes/pkg/kubelet/certificate"
kubeletcertificate "k8s.io/kubernetes/pkg/kubelet/certificate"
"k8s.io/kubernetes/pkg/kubelet/certificate/bootstrap"
"k8s.io/kubernetes/pkg/kubelet/cm"
"k8s.io/kubernetes/pkg/kubelet/config"
Expand Down Expand Up @@ -334,11 +335,13 @@ func run(s *options.KubeletServer, kubeDeps *kubelet.Dependencies) (err error) {
var clientCertificateManager certificate.Manager
if err == nil {
if s.RotateCertificates && utilfeature.DefaultFeatureGate.Enabled(features.RotateKubeletClientCertificate) {
clientCertificateManager, err = certificate.NewKubeletClientCertificateManager(s.CertDirectory, nodeName, clientConfig.CertData, clientConfig.KeyData, clientConfig.CertFile, clientConfig.KeyFile)
clientCertificateManager, err = kubeletcertificate.NewKubeletClientCertificateManager(s.CertDirectory, nodeName, clientConfig.CertData, clientConfig.KeyData, clientConfig.CertFile, clientConfig.KeyFile)
if err != nil {
return err
}
if err := certificate.UpdateTransport(wait.NeverStop, clientConfig, clientCertificateManager); err != nil {
// we set exitIfExpired to true because we use this client configuration to request new certs - if we are unable
// to request new certs, we will be unable to continue normal operation
if err := kubeletcertificate.UpdateTransport(wait.NeverStop, clientConfig, clientCertificateManager, true); err != nil {
return err
}
}
Expand Down
2 changes: 1 addition & 1 deletion federation/pkg/kubefed/init/init_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ const (
testAPIVersion = "testVersion"
)

func TestInitFederation(t *testing.T) {
func DISABLE_TestInitFederation(t *testing.T) {
cmdErrMsg := ""
cmdutil.BehaviorOnFatal(func(str string, code int) {
cmdErrMsg = str
Expand Down
1 change: 0 additions & 1 deletion hack/.golint_failures
Original file line number Diff line number Diff line change
Expand Up @@ -231,7 +231,6 @@ pkg/kubelet/apis/kubeletconfig
pkg/kubelet/apis/kubeletconfig/v1alpha1
pkg/kubelet/cadvisor
pkg/kubelet/cadvisor/testing
pkg/kubelet/certificate
pkg/kubelet/client
pkg/kubelet/cm
pkg/kubelet/cm/util
Expand Down
1 change: 1 addition & 0 deletions origin.sha
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
a050d411d8fe01a4216723cffdc7f6c72145729c
9 changes: 6 additions & 3 deletions pkg/api/serialization_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -19,15 +19,14 @@ package api_test
import (
"bytes"
"encoding/hex"
"encoding/json"
"io/ioutil"
"math/rand"
"reflect"
"strings"
"testing"

"github.com/golang/protobuf/proto"
jsoniter "github.com/json-iterator/go"
"github.com/ugorji/go/codec"

"k8s.io/api/core/v1"
"k8s.io/api/extensions/v1beta1"
Expand All @@ -41,6 +40,7 @@ import (
"k8s.io/apimachinery/pkg/runtime/schema"
"k8s.io/apimachinery/pkg/runtime/serializer/streaming"
"k8s.io/apimachinery/pkg/util/diff"
"k8s.io/apimachinery/pkg/util/json"
"k8s.io/apimachinery/pkg/util/sets"
"k8s.io/apimachinery/pkg/watch"
"k8s.io/kubernetes/pkg/api"
Expand Down Expand Up @@ -550,10 +550,13 @@ func BenchmarkDecodeIntoJSONCodecGen(b *testing.B) {
encoded[i] = data
}

handler := &codec.JsonHandle{}

b.ResetTimer()
for i := 0; i < b.N; i++ {
obj := v1.Pod{}
if err := jsoniter.ConfigFastest.Unmarshal(encoded[i%width], &obj); err != nil {
// if err := jsoniter.ConfigFastest.Unmarshal(encoded[i%width], &obj); err != nil {
if err := codec.NewDecoderBytes(encoded[i%width], handler).Decode(&obj); err != nil {
b.Fatal(err)
}
}
Expand Down
2 changes: 1 addition & 1 deletion pkg/api/v1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/api
// +k8s:conversion-gen-external-types=../../../vendor/k8s.io/api/core/v1
// +k8s:conversion-gen-external-types=k8s.io/api/core/v1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../vendor/k8s.io/api/core/v1

Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/admission/v1alpha1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/admission
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/admission/v1alpha1
// +k8s:conversion-gen-external-types=k8s.io/api/admission/v1alpha1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/admission/v1alpha1

Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/admissionregistration/v1alpha1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/admissionregistration
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/admissionregistration/v1alpha1
// +k8s:conversion-gen-external-types=k8s.io/api/admissionregistration/v1alpha1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/admissionregistration/v1alpha1

Expand Down
11 changes: 7 additions & 4 deletions pkg/apis/admissionregistration/validation/validation.go
Original file line number Diff line number Diff line change
Expand Up @@ -175,17 +175,20 @@ func validateExternalAdmissionHook(hook *admissionregistration.ExternalAdmission
var allErrors field.ErrorList
// hook.Name must be fully qualified
allErrors = append(allErrors, validation.IsFullyQualifiedName(fldPath.Child("name"), hook.Name)...)

for i, rule := range hook.Rules {
allErrors = append(allErrors, validateRuleWithOperations(&rule, fldPath.Child("rules").Index(i))...)
}
// TODO: relax the validation rule when admissionregistration is beta.
if hook.FailurePolicy != nil && *hook.FailurePolicy != admissionregistration.Ignore {
allErrors = append(allErrors, field.NotSupported(fldPath.Child("failurePolicy"), *hook.FailurePolicy, []string{string(admissionregistration.Ignore)}))
if hook.FailurePolicy != nil && !supportedFailurePolicies.Has(string(*hook.FailurePolicy)) {
allErrors = append(allErrors, field.NotSupported(fldPath.Child("failurePolicy"), *hook.FailurePolicy, supportedFailurePolicies.List()))
}
return allErrors
}

var supportedFailurePolicies = sets.NewString(
string(admissionregistration.Ignore),
string(admissionregistration.Fail),
)

var supportedOperations = sets.NewString(
string(admissionregistration.OperationAll),
string(admissionregistration.Create),
Expand Down
6 changes: 3 additions & 3 deletions pkg/apis/admissionregistration/validation/validation_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -469,18 +469,18 @@ func TestValidateExternalAdmissionHookConfiguration(t *testing.T) {
expectedError: `externalAdmissionHooks[0].rules[0].resources: Invalid value: []string{"*/*", "a"}: if '*/*' is present, must not specify other resources`,
},
{
name: "FailurePolicy can only be \"Ignore\"",
name: "FailurePolicy can only be \"Ignore\" or \"Fail\"",
config: getExternalAdmissionHookConfiguration(
[]admissionregistration.ExternalAdmissionHook{
{
Name: "webhook.k8s.io",
FailurePolicy: func() *admissionregistration.FailurePolicyType {
r := admissionregistration.Fail
r := admissionregistration.FailurePolicyType("other")
return &r
}(),
},
}),
expectedError: `failurePolicy: Unsupported value: "Fail": supported values: Ignore`,
expectedError: `failurePolicy: Unsupported value: "other": supported values: Fail, Ignore`,
},
}
for _, test := range tests {
Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/apps/v1beta1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ limitations under the License.

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/apps
// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/extensions
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/apps/v1beta1
// +k8s:conversion-gen-external-types=k8s.io/api/apps/v1beta1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/apps/v1beta1

Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/apps/v1beta2/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ limitations under the License.

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/apps
// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/extensions
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/apps/v1beta2
// +k8s:conversion-gen-external-types=k8s.io/api/apps/v1beta2
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/apps/v1beta2

Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/authentication/v1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/authentication
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/authentication/v1
// +k8s:conversion-gen-external-types=k8s.io/api/authentication/v1
// +groupName=authentication.k8s.io
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/authentication/v1
Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/authentication/v1beta1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/authentication
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/authentication/v1beta1
// +k8s:conversion-gen-external-types=k8s.io/api/authentication/v1beta1
// +groupName=authentication.k8s.io
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/authentication/v1beta1
Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/authorization/v1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/authorization
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/authorization/v1
// +k8s:conversion-gen-external-types=k8s.io/api/authorization/v1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/authorization/v1

Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/authorization/v1beta1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/authorization
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/authorization/v1beta1
// +k8s:conversion-gen-external-types=k8s.io/api/authorization/v1beta1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/authorization/v1beta1

Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/autoscaling/v1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/autoscaling
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/autoscaling/v1
// +k8s:conversion-gen-external-types=k8s.io/api/autoscaling/v1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/autoscaling/v1

Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/autoscaling/v2beta1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/autoscaling
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/autoscaling/v2beta1
// +k8s:conversion-gen-external-types=k8s.io/api/autoscaling/v2beta1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/autoscaling/v2beta1

Expand Down
3 changes: 3 additions & 0 deletions pkg/apis/batch/install/install.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,9 @@ import (
"k8s.io/kubernetes/pkg/apis/batch/v1"
"k8s.io/kubernetes/pkg/apis/batch/v1beta1"
"k8s.io/kubernetes/pkg/apis/batch/v2alpha1"

// force determinstic ordering when loading these packages
_ "k8s.io/kubernetes/pkg/apis/extensions/install"
)

func init() {
Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/batch/v1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/batch
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/batch/v1
// +k8s:conversion-gen-external-types=k8s.io/api/batch/v1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/batch/v1

Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/batch/v1beta1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/batch
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/batch/v1beta1
// +k8s:conversion-gen-external-types=k8s.io/api/batch/v1beta1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/batch/v1beta1

Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/batch/v2alpha1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/batch
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/batch/v2alpha1
// +k8s:conversion-gen-external-types=k8s.io/api/batch/v2alpha1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/batch/v2alpha1

Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/certificates/v1beta1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/certificates
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/certificates/v1beta1
// +k8s:conversion-gen-external-types=k8s.io/api/certificates/v1beta1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/certificates/v1beta1

Expand Down
2 changes: 1 addition & 1 deletion pkg/apis/extensions/v1beta1/doc.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ limitations under the License.
*/

// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/extensions
// +k8s:conversion-gen-external-types=../../../../vendor/k8s.io/api/extensions/v1beta1
// +k8s:conversion-gen-external-types=k8s.io/api/extensions/v1beta1
// +k8s:defaulter-gen=TypeMeta
// +k8s:defaulter-gen-input=../../../../vendor/k8s.io/api/extensions/v1beta1

Expand Down
Loading