aboutsummaryrefslogtreecommitdiff
path: root/deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions
diff options
context:
space:
mode:
authorMax Audron <audron@cocaine.farm>2021-06-05 00:11:00 +0200
committerMax Audron <audron@cocaine.farm>2021-06-05 00:11:00 +0200
commitacc28a198d38be468ca5cb7962a4c4b11a8e7e67 (patch)
tree838195c62ff95058b2895c708639ca532be550ec /deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions
parentRelease 1.0.1 (diff)
remove tanka vendoring
Diffstat (limited to 'deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions')
-rw-r--r--deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions/kausal-shim.libsonnet205
1 files changed, 0 insertions, 205 deletions
diff --git a/deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions/kausal-shim.libsonnet b/deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions/kausal-shim.libsonnet
deleted file mode 100644
index 0e1ed28..0000000
--- a/deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions/kausal-shim.libsonnet
+++ /dev/null
@@ -1,205 +0,0 @@
-// kausal-shim.libsonnet: mimics internals of the ksonnet-lib API for kausal.libsonnet
-//
-// importing ourselves here, to avoid receiving kausal patches,
-// which we otherwise would (super includes them)
-local k = import 'k.libsonnet';
-
-{
- core+: { v1+: {
- container+: {
- envType: k.core.v1.envVar,
- envFromType: k.core.v1.envFromSource {
- new():: {},
- },
- portsType: k.core.v1.containerPort,
- volumeMountsType: k.core.v1.volumeMount,
- },
- pod+: {
- spec+: {
- volumesType: k.core.v1.volume,
- },
- },
- service+: {
- spec+: {
- withClusterIp: self.withClusterIP,
- withLoadBalancerIp: self.withLoadBalancerIP,
- portsType: k.core.v1.servicePort,
- },
- },
- } },
-
- local appsAffinityPatch = {
- nodeAffinity+: {
- requiredDuringSchedulingIgnoredDuringExecutionType: k.core.v1.nodeSelector {
- new():: {},
- nodeSelectorTermsType: k.core.v1.nodeSelectorTerm {
- new():: {},
- matchFieldsType: k.core.v1.nodeSelectorRequirement,
- },
- },
- preferredDuringSchedulingIgnoredDuringExecutionType: k.core.v1.preferredSchedulingTerm {
- new():: {},
- preferenceType: {
- matchFieldsType: k.core.v1.nodeSelectorRequirement,
- },
- },
- },
- podAntiAffinity+: {
- requiredDuringSchedulingIgnoredDuringExecutionType: k.core.v1.podAffinityTerm {
- new():: {},
- },
- },
- },
-
- local appsPatch = {
- deployment+: {
- spec+: { template+: { spec+: {
- volumesType: k.core.v1.volume,
- containersType: k.core.v1.container,
- tolerationsType: k.core.v1.toleration {
- new():: {},
- },
- affinity+: appsAffinityPatch,
- } } },
- },
- daemonSet+: {
- new(name=''):: super.new(name),
- spec+: { template+: { spec+: {
- withHostPid:: self.withHostPID,
- tolerationsType: k.core.v1.toleration {
- new():: {},
- },
- affinity+: appsAffinityPatch,
- } } },
- },
- statefulSet+: {
- spec+: { template+: { spec+: {
- volumesType: k.core.v1.volume,
- affinity+: appsAffinityPatch,
- tolerationsType: k.core.v1.toleration {
- new():: {},
- },
- imagePullSecretsType: k.core.v1.localObjectReference {
- new():: {},
- },
- } } },
- },
- },
-
- apps+: {
- v1+: appsPatch,
- v1beta1+: appsPatch,
- },
- extensions+: {
- v1beta1+: appsPatch {
- ingress+: {
- new(name=''):: super.new(name),
- spec+: {
- rulesType: k.extensions.v1beta1.ingressRule {
- httpType+: { pathsType: k.extensions.v1beta1.httpIngressPath },
- },
- },
- },
- },
- },
-
- batch+: {
- local patch = {
- new(name=''):: super.new(name),
- mixin+: { spec+: { jobTemplate+: { spec+: { template+: { spec+: {
- imagePullSecretsType: k.core.v1.localObjectReference {
- new():: {},
- },
- } } } } } },
- },
-
- v1+: {
- job+: patch,
- cronJob+: patch,
- },
- v1beta1+: {
- job+: patch,
- cronJob+: patch,
- },
- },
-
-
- local rbacPatch = {
- local role = {
- new(name=''):: super.new(name),
- rulesType: k.rbac.v1beta1.policyRule {
- new():: {},
- },
- },
- role+: role,
- clusterRole+: role,
-
- local binding = {
- new(name=''):: super.new(name),
- subjectsType: k.rbac.v1beta1.subject {
- new():: {},
- },
- },
- roleBinding+: binding,
- clusterRoleBinding+: binding,
-
- policyRule+: {
- withNonResourceUrls: self.withNonResourceURLs,
- },
- },
- rbac+: {
- v1+: rbacPatch,
- v1beta1+: rbacPatch,
- },
-
- policy+: {
- v1beta1+: {
- podDisruptionBudget+: {
- new(name=''):: super.new(name),
- },
- podSecurityPolicy+: {
- new(name=''):: super.new(name),
- mixin+: { spec+: {
- runAsUser+: { rangesType: k.policy.v1beta1.idRange { new():: {} } },
- withHostIpc: self.withHostIPC,
- withHostPid: self.withHostPID,
- } },
- },
- },
- },
-
- storage+: { v1+: {
- storageClass+: {
- new(name=''):: super.new(name),
- },
- } },
-
- scheduling+: { v1beta1+: {
- priorityClass+: {
- new(name=''):: super.new(name),
- },
- } },
-
- admissionregistration+: { v1beta1+: {
- local webhooksType = k.admissionregistration.v1beta1.webhook {
- new():: {},
- rulesType: k.admissionregistration.v1beta1.ruleWithOperations {
- new():: {},
- },
- mixin+: { namespaceSelector+: { matchExpressionsType: {
- new():: {},
- withKey(key):: { key: key },
- withOperator(operator):: { operator: operator },
- withValues(values):: { values: if std.isArray(values) then values else [values] },
- } } },
- },
- mutatingWebhookConfiguration+: {
- new(name=''):: super.new(name),
- webhooksType: webhooksType,
- },
- validatingWebhookConfiguration+: {
- new(name=''):: super.new(name),
- webhooksType: webhooksType,
- },
- } },
-}