diff options
| author | Max Audron <audron@cocaine.farm> | 2021-06-05 00:11:00 +0200 |
|---|---|---|
| committer | Max Audron <audron@cocaine.farm> | 2021-06-05 00:11:00 +0200 |
| commit | acc28a198d38be468ca5cb7962a4c4b11a8e7e67 (patch) | |
| tree | 838195c62ff95058b2895c708639ca532be550ec /deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions | |
| parent | Release 1.0.1 (diff) | |
remove tanka vendoring
Diffstat (limited to 'deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions')
| -rw-r--r-- | deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions/kausal-shim.libsonnet | 205 |
1 files changed, 0 insertions, 205 deletions
diff --git a/deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions/kausal-shim.libsonnet b/deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions/kausal-shim.libsonnet deleted file mode 100644 index 0e1ed28..0000000 --- a/deploy/vendor/github.com/jsonnet-libs/k8s-alpha/1.19/extensions/kausal-shim.libsonnet +++ /dev/null @@ -1,205 +0,0 @@ -// kausal-shim.libsonnet: mimics internals of the ksonnet-lib API for kausal.libsonnet -// -// importing ourselves here, to avoid receiving kausal patches, -// which we otherwise would (super includes them) -local k = import 'k.libsonnet'; - -{ - core+: { v1+: { - container+: { - envType: k.core.v1.envVar, - envFromType: k.core.v1.envFromSource { - new():: {}, - }, - portsType: k.core.v1.containerPort, - volumeMountsType: k.core.v1.volumeMount, - }, - pod+: { - spec+: { - volumesType: k.core.v1.volume, - }, - }, - service+: { - spec+: { - withClusterIp: self.withClusterIP, - withLoadBalancerIp: self.withLoadBalancerIP, - portsType: k.core.v1.servicePort, - }, - }, - } }, - - local appsAffinityPatch = { - nodeAffinity+: { - requiredDuringSchedulingIgnoredDuringExecutionType: k.core.v1.nodeSelector { - new():: {}, - nodeSelectorTermsType: k.core.v1.nodeSelectorTerm { - new():: {}, - matchFieldsType: k.core.v1.nodeSelectorRequirement, - }, - }, - preferredDuringSchedulingIgnoredDuringExecutionType: k.core.v1.preferredSchedulingTerm { - new():: {}, - preferenceType: { - matchFieldsType: k.core.v1.nodeSelectorRequirement, - }, - }, - }, - podAntiAffinity+: { - requiredDuringSchedulingIgnoredDuringExecutionType: k.core.v1.podAffinityTerm { - new():: {}, - }, - }, - }, - - local appsPatch = { - deployment+: { - spec+: { template+: { spec+: { - volumesType: k.core.v1.volume, - containersType: k.core.v1.container, - tolerationsType: k.core.v1.toleration { - new():: {}, - }, - affinity+: appsAffinityPatch, - } } }, - }, - daemonSet+: { - new(name=''):: super.new(name), - spec+: { template+: { spec+: { - withHostPid:: self.withHostPID, - tolerationsType: k.core.v1.toleration { - new():: {}, - }, - affinity+: appsAffinityPatch, - } } }, - }, - statefulSet+: { - spec+: { template+: { spec+: { - volumesType: k.core.v1.volume, - affinity+: appsAffinityPatch, - tolerationsType: k.core.v1.toleration { - new():: {}, - }, - imagePullSecretsType: k.core.v1.localObjectReference { - new():: {}, - }, - } } }, - }, - }, - - apps+: { - v1+: appsPatch, - v1beta1+: appsPatch, - }, - extensions+: { - v1beta1+: appsPatch { - ingress+: { - new(name=''):: super.new(name), - spec+: { - rulesType: k.extensions.v1beta1.ingressRule { - httpType+: { pathsType: k.extensions.v1beta1.httpIngressPath }, - }, - }, - }, - }, - }, - - batch+: { - local patch = { - new(name=''):: super.new(name), - mixin+: { spec+: { jobTemplate+: { spec+: { template+: { spec+: { - imagePullSecretsType: k.core.v1.localObjectReference { - new():: {}, - }, - } } } } } }, - }, - - v1+: { - job+: patch, - cronJob+: patch, - }, - v1beta1+: { - job+: patch, - cronJob+: patch, - }, - }, - - - local rbacPatch = { - local role = { - new(name=''):: super.new(name), - rulesType: k.rbac.v1beta1.policyRule { - new():: {}, - }, - }, - role+: role, - clusterRole+: role, - - local binding = { - new(name=''):: super.new(name), - subjectsType: k.rbac.v1beta1.subject { - new():: {}, - }, - }, - roleBinding+: binding, - clusterRoleBinding+: binding, - - policyRule+: { - withNonResourceUrls: self.withNonResourceURLs, - }, - }, - rbac+: { - v1+: rbacPatch, - v1beta1+: rbacPatch, - }, - - policy+: { - v1beta1+: { - podDisruptionBudget+: { - new(name=''):: super.new(name), - }, - podSecurityPolicy+: { - new(name=''):: super.new(name), - mixin+: { spec+: { - runAsUser+: { rangesType: k.policy.v1beta1.idRange { new():: {} } }, - withHostIpc: self.withHostIPC, - withHostPid: self.withHostPID, - } }, - }, - }, - }, - - storage+: { v1+: { - storageClass+: { - new(name=''):: super.new(name), - }, - } }, - - scheduling+: { v1beta1+: { - priorityClass+: { - new(name=''):: super.new(name), - }, - } }, - - admissionregistration+: { v1beta1+: { - local webhooksType = k.admissionregistration.v1beta1.webhook { - new():: {}, - rulesType: k.admissionregistration.v1beta1.ruleWithOperations { - new():: {}, - }, - mixin+: { namespaceSelector+: { matchExpressionsType: { - new():: {}, - withKey(key):: { key: key }, - withOperator(operator):: { operator: operator }, - withValues(values):: { values: if std.isArray(values) then values else [values] }, - } } }, - }, - mutatingWebhookConfiguration+: { - new(name=''):: super.new(name), - webhooksType: webhooksType, - }, - validatingWebhookConfiguration+: { - new(name=''):: super.new(name), - webhooksType: webhooksType, - }, - } }, -} |
