Merge pull request #39164 from danwinship/networkpolicy-v1
Automatic merge from submit-queue Move NetworkPolicy to v1 Move NetworkPolicy to v1 @kubernetes/sig-network-misc **Release note**: ```release-note NetworkPolicy has been moved from `extensions/v1beta1` to the new `networking.k8s.io/v1` API group. The structure remains unchanged from the beta1 API. The `net.beta.kubernetes.io/network-policy` annotation on Namespaces to opt in to isolation has been removed. Instead, isolation is now determined at a per-pod level, with pods being isolated if there is any NetworkPolicy whose spec.podSelector targets them. Pods that are targeted by NetworkPolicies accept traffic that is accepted by any of the NetworkPolicies (and nothing else), and pods that are not targeted by any NetworkPolicy accept all traffic by default. Action Required: When upgrading to Kubernetes 1.7 (and a network plugin that supports the new NetworkPolicy v1 semantics), to ensure full behavioral compatibility with v1beta1: 1. In Namespaces that previously had the "DefaultDeny" annotation, you can create equivalent v1 semantics by creating a NetworkPolicy that matches all pods but does not allow any traffic: kind: NetworkPolicy apiVersion: networking.k8s.io/v1 metadata: name: default-deny spec: podSelector: This will ensure that pods that aren't match by any other NetworkPolicy will continue to be fully-isolated, as they were before. 2. In Namespaces that previously did not have the "DefaultDeny" annotation, you should delete any existing NetworkPolicy objects. These would have had no effect before, but with v1 semantics they might cause some traffic to be blocked that you didn't intend to be blocked. ```
This commit is contained in:
File diff suppressed because it is too large
Load Diff
@@ -9765,6 +9765,7 @@
|
|||||||
},
|
},
|
||||||
"v1beta1.NetworkPolicy": {
|
"v1beta1.NetworkPolicy": {
|
||||||
"id": "v1beta1.NetworkPolicy",
|
"id": "v1beta1.NetworkPolicy",
|
||||||
|
"description": "NetworkPolicy describes what network traffic is allowed for a set of Pods",
|
||||||
"properties": {
|
"properties": {
|
||||||
"kind": {
|
"kind": {
|
||||||
"type": "string",
|
"type": "string",
|
||||||
@@ -9799,7 +9800,7 @@
|
|||||||
"items": {
|
"items": {
|
||||||
"$ref": "v1beta1.NetworkPolicyIngressRule"
|
"$ref": "v1beta1.NetworkPolicyIngressRule"
|
||||||
},
|
},
|
||||||
"description": "List of ingress rules to be applied to the selected pods. Traffic is allowed to a pod if namespace.networkPolicy.ingress.isolation is undefined and cluster policy allows it, OR if the traffic source is the pod's local node, OR if the traffic matches at least one ingress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy does not affect ingress isolation. If this field is present and contains at least one rule, this policy allows any traffic which matches at least one of the ingress rules in this list."
|
"description": "List of ingress rules to be applied to the selected pods. Traffic is allowed to a pod if there are no NetworkPolicies selecting the pod OR if the traffic source is the pod's local node, OR if the traffic matches at least one ingress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy does not allow any traffic (and serves solely to ensure that the pods it selects are isolated by default)."
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
114
api/swagger-spec/networking.k8s.io.json
Normal file
114
api/swagger-spec/networking.k8s.io.json
Normal file
@@ -0,0 +1,114 @@
|
|||||||
|
{
|
||||||
|
"swaggerVersion": "1.2",
|
||||||
|
"apiVersion": "",
|
||||||
|
"basePath": "https://10.10.10.10:6443",
|
||||||
|
"resourcePath": "/apis/networking.k8s.io",
|
||||||
|
"info": {
|
||||||
|
"title": "",
|
||||||
|
"description": ""
|
||||||
|
},
|
||||||
|
"apis": [
|
||||||
|
{
|
||||||
|
"path": "/apis/networking.k8s.io",
|
||||||
|
"description": "get information of a group",
|
||||||
|
"operations": [
|
||||||
|
{
|
||||||
|
"type": "v1.APIGroup",
|
||||||
|
"method": "GET",
|
||||||
|
"summary": "get information of a group",
|
||||||
|
"nickname": "getAPIGroup",
|
||||||
|
"parameters": [],
|
||||||
|
"produces": [
|
||||||
|
"application/json",
|
||||||
|
"application/yaml",
|
||||||
|
"application/vnd.kubernetes.protobuf"
|
||||||
|
],
|
||||||
|
"consumes": [
|
||||||
|
"application/json",
|
||||||
|
"application/yaml",
|
||||||
|
"application/vnd.kubernetes.protobuf"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"models": {
|
||||||
|
"v1.APIGroup": {
|
||||||
|
"id": "v1.APIGroup",
|
||||||
|
"description": "APIGroup contains the name, the supported versions, and the preferred version of a group.",
|
||||||
|
"required": [
|
||||||
|
"name",
|
||||||
|
"versions",
|
||||||
|
"serverAddressByClientCIDRs"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"kind": {
|
||||||
|
"type": "string",
|
||||||
|
"description": "Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: http://releases.k8s.io/HEAD/docs/devel/api-conventions.md#types-kinds"
|
||||||
|
},
|
||||||
|
"apiVersion": {
|
||||||
|
"type": "string",
|
||||||
|
"description": "APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: http://releases.k8s.io/HEAD/docs/devel/api-conventions.md#resources"
|
||||||
|
},
|
||||||
|
"name": {
|
||||||
|
"type": "string",
|
||||||
|
"description": "name is the name of the group."
|
||||||
|
},
|
||||||
|
"versions": {
|
||||||
|
"type": "array",
|
||||||
|
"items": {
|
||||||
|
"$ref": "v1.GroupVersionForDiscovery"
|
||||||
|
},
|
||||||
|
"description": "versions are the versions supported in this group."
|
||||||
|
},
|
||||||
|
"preferredVersion": {
|
||||||
|
"$ref": "v1.GroupVersionForDiscovery",
|
||||||
|
"description": "preferredVersion is the version preferred by the API server, which probably is the storage version."
|
||||||
|
},
|
||||||
|
"serverAddressByClientCIDRs": {
|
||||||
|
"type": "array",
|
||||||
|
"items": {
|
||||||
|
"$ref": "v1.ServerAddressByClientCIDR"
|
||||||
|
},
|
||||||
|
"description": "a map of client CIDR to server address that is serving this group. This is to help clients reach servers in the most network-efficient way possible. Clients can use the appropriate server address as per the CIDR that they match. In case of multiple matches, clients should use the longest matching CIDR. The server returns only those CIDRs that it thinks that the client can match. For example: the master will return an internal IP CIDR only, if the client reaches the server using an internal IP. Server looks at X-Forwarded-For header or X-Real-Ip header or request.RemoteAddr (in that order) to get the client IP."
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"v1.GroupVersionForDiscovery": {
|
||||||
|
"id": "v1.GroupVersionForDiscovery",
|
||||||
|
"description": "GroupVersion contains the \"group/version\" and \"version\" string of a version. It is made a struct to keep extensibility.",
|
||||||
|
"required": [
|
||||||
|
"groupVersion",
|
||||||
|
"version"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"groupVersion": {
|
||||||
|
"type": "string",
|
||||||
|
"description": "groupVersion specifies the API group and version in the form \"group/version\""
|
||||||
|
},
|
||||||
|
"version": {
|
||||||
|
"type": "string",
|
||||||
|
"description": "version specifies the version in the form of \"version\". This is to save the clients the trouble of splitting the GroupVersion."
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"v1.ServerAddressByClientCIDR": {
|
||||||
|
"id": "v1.ServerAddressByClientCIDR",
|
||||||
|
"description": "ServerAddressByClientCIDR helps the client to determine the server address that they should use, depending on the clientCIDR that they match.",
|
||||||
|
"required": [
|
||||||
|
"clientCIDR",
|
||||||
|
"serverAddress"
|
||||||
|
],
|
||||||
|
"properties": {
|
||||||
|
"clientCIDR": {
|
||||||
|
"type": "string",
|
||||||
|
"description": "The CIDR with which clients can match their IP to figure out the server address that they should use."
|
||||||
|
},
|
||||||
|
"serverAddress": {
|
||||||
|
"type": "string",
|
||||||
|
"description": "Address of this server, suitable for a client that matches the above CIDR. This can be a hostname, hostname:port, IP or IP:port."
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
1455
api/swagger-spec/networking.k8s.io_v1.json
Normal file
1455
api/swagger-spec/networking.k8s.io_v1.json
Normal file
File diff suppressed because it is too large
Load Diff
@@ -85,6 +85,14 @@
|
|||||||
"path": "/apis/extensions",
|
"path": "/apis/extensions",
|
||||||
"description": "get information of a group"
|
"description": "get information of a group"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"path": "/apis/networking.k8s.io/v1",
|
||||||
|
"description": "API at /apis/networking.k8s.io/v1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"path": "/apis/networking.k8s.io",
|
||||||
|
"description": "get information of a group"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"path": "/apis/policy/v1beta1",
|
"path": "/apis/policy/v1beta1",
|
||||||
"description": "API at /apis/policy/v1beta1"
|
"description": "API at /apis/policy/v1beta1"
|
||||||
|
@@ -23,6 +23,7 @@ go_library(
|
|||||||
"//pkg/apis/apps:go_default_library",
|
"//pkg/apis/apps:go_default_library",
|
||||||
"//pkg/apis/batch:go_default_library",
|
"//pkg/apis/batch:go_default_library",
|
||||||
"//pkg/apis/extensions:go_default_library",
|
"//pkg/apis/extensions:go_default_library",
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
"//pkg/capabilities:go_default_library",
|
"//pkg/capabilities:go_default_library",
|
||||||
"//pkg/client/clientset_generated/internalclientset:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset:go_default_library",
|
||||||
"//pkg/client/informers/informers_generated/internalversion:go_default_library",
|
"//pkg/client/informers/informers_generated/internalversion:go_default_library",
|
||||||
|
@@ -57,6 +57,7 @@ import (
|
|||||||
"k8s.io/kubernetes/pkg/apis/apps"
|
"k8s.io/kubernetes/pkg/apis/apps"
|
||||||
"k8s.io/kubernetes/pkg/apis/batch"
|
"k8s.io/kubernetes/pkg/apis/batch"
|
||||||
"k8s.io/kubernetes/pkg/apis/extensions"
|
"k8s.io/kubernetes/pkg/apis/extensions"
|
||||||
|
"k8s.io/kubernetes/pkg/apis/networking"
|
||||||
"k8s.io/kubernetes/pkg/capabilities"
|
"k8s.io/kubernetes/pkg/capabilities"
|
||||||
"k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
|
"k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
|
||||||
informers "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion"
|
informers "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion"
|
||||||
@@ -471,8 +472,9 @@ func BuildStorageFactory(s *options.ServerRunOptions) (*serverstorage.DefaultSto
|
|||||||
return nil, fmt.Errorf("error in initializing storage factory: %s", err)
|
return nil, fmt.Errorf("error in initializing storage factory: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// keep Deployments in extensions for backwards compatibility, we'll have to migrate at some point, eventually
|
// keep Deployments and NetworkPolicies in extensions for backwards compatibility, we'll have to migrate at some point, eventually
|
||||||
storageFactory.AddCohabitatingResources(extensions.Resource("deployments"), apps.Resource("deployments"))
|
storageFactory.AddCohabitatingResources(extensions.Resource("deployments"), apps.Resource("deployments"))
|
||||||
|
storageFactory.AddCohabitatingResources(extensions.Resource("networkpolicies"), networking.Resource("networkpolicies"))
|
||||||
for _, override := range s.Etcd.EtcdServersOverrides {
|
for _, override := range s.Etcd.EtcdServersOverrides {
|
||||||
tokens := strings.Split(override, "#")
|
tokens := strings.Split(override, "#")
|
||||||
if len(tokens) != 2 {
|
if len(tokens) != 2 {
|
||||||
|
@@ -48,6 +48,7 @@ var (
|
|||||||
"apps/",
|
"apps/",
|
||||||
"policy/",
|
"policy/",
|
||||||
"settings/",
|
"settings/",
|
||||||
|
"networking/",
|
||||||
}, "group/versions that client-gen will generate clients for. At most one version per group is allowed. Specified in the format \"group1/version1,group2/version2...\".")
|
}, "group/versions that client-gen will generate clients for. At most one version per group is allowed. Specified in the format \"group1/version1,group2/version2...\".")
|
||||||
includedTypesOverrides = flag.StringSlice("included-types-overrides", []string{}, "list of group/version/type for which client should be generated. By default, client is generated for all types which have genclient=true in types.go. This overrides that. For each groupVersion in this list, only the types mentioned here will be included. The default check of genclient=true will be used for other group versions.")
|
includedTypesOverrides = flag.StringSlice("included-types-overrides", []string{}, "list of group/version/type for which client should be generated. By default, client is generated for all types which have genclient=true in types.go. This overrides that. For each groupVersion in this list, only the types mentioned here will be included. The default check of genclient=true will be used for other group versions.")
|
||||||
basePath = flag.String("input-base", "k8s.io/kubernetes/pkg/apis", "base path to look for the api group.")
|
basePath = flag.String("input-base", "k8s.io/kubernetes/pkg/apis", "base path to look for the api group.")
|
||||||
|
@@ -95,6 +95,7 @@ func New() *Generator {
|
|||||||
`-k8s.io/client-go/pkg/api/v1`,
|
`-k8s.io/client-go/pkg/api/v1`,
|
||||||
`k8s.io/metrics/pkg/apis/metrics/v1alpha1`,
|
`k8s.io/metrics/pkg/apis/metrics/v1alpha1`,
|
||||||
`k8s.io/metrics/pkg/apis/custom_metrics/v1alpha1`,
|
`k8s.io/metrics/pkg/apis/custom_metrics/v1alpha1`,
|
||||||
|
`k8s.io/kubernetes/pkg/apis/networking/v1`,
|
||||||
}, ","),
|
}, ","),
|
||||||
DropEmbeddedFields: "k8s.io/apimachinery/pkg/apis/meta/v1.TypeMeta",
|
DropEmbeddedFields: "k8s.io/apimachinery/pkg/apis/meta/v1.TypeMeta",
|
||||||
}
|
}
|
||||||
|
@@ -5211,6 +5211,9 @@ Examples:<br>
|
|||||||
</div>
|
</div>
|
||||||
<div class="sect2">
|
<div class="sect2">
|
||||||
<h3 id="_v1beta1_networkpolicy">v1beta1.NetworkPolicy</h3>
|
<h3 id="_v1beta1_networkpolicy">v1beta1.NetworkPolicy</h3>
|
||||||
|
<div class="paragraph">
|
||||||
|
<p>NetworkPolicy describes what network traffic is allowed for a set of Pods</p>
|
||||||
|
</div>
|
||||||
<table class="tableblock frame-all grid-all" style="width:100%; ">
|
<table class="tableblock frame-all grid-all" style="width:100%; ">
|
||||||
<colgroup>
|
<colgroup>
|
||||||
<col style="width:20%;">
|
<col style="width:20%;">
|
||||||
@@ -5466,7 +5469,7 @@ Examples:<br>
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td class="tableblock halign-left valign-top"><p class="tableblock">ingress</p></td>
|
<td class="tableblock halign-left valign-top"><p class="tableblock">ingress</p></td>
|
||||||
<td class="tableblock halign-left valign-top"><p class="tableblock">List of ingress rules to be applied to the selected pods. Traffic is allowed to a pod if namespace.networkPolicy.ingress.isolation is undefined and cluster policy allows it, OR if the traffic source is the pod’s local node, OR if the traffic matches at least one ingress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy does not affect ingress isolation. If this field is present and contains at least one rule, this policy allows any traffic which matches at least one of the ingress rules in this list.</p></td>
|
<td class="tableblock halign-left valign-top"><p class="tableblock">List of ingress rules to be applied to the selected pods. Traffic is allowed to a pod if there are no NetworkPolicies selecting the pod OR if the traffic source is the pod’s local node, OR if the traffic matches at least one ingress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy does not allow any traffic (and serves solely to ensure that the pods it selects are isolated by default).</p></td>
|
||||||
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
<td class="tableblock halign-left valign-top"><p class="tableblock">false</p></td>
|
||||||
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1beta1_networkpolicyingressrule">v1beta1.NetworkPolicyIngressRule</a> array</p></td>
|
<td class="tableblock halign-left valign-top"><p class="tableblock"><a href="#_v1beta1_networkpolicyingressrule">v1beta1.NetworkPolicyIngressRule</a> array</p></td>
|
||||||
<td class="tableblock halign-left valign-top"></td>
|
<td class="tableblock halign-left valign-top"></td>
|
||||||
@@ -8117,7 +8120,7 @@ Both these may change in the future. Incoming requests are matched against the h
|
|||||||
</div>
|
</div>
|
||||||
<div id="footer">
|
<div id="footer">
|
||||||
<div id="footer-text">
|
<div id="footer-text">
|
||||||
Last updated 2017-05-25 09:32:15 UTC
|
Last updated 2017-05-27 18:54:49 UTC
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</body>
|
</body>
|
||||||
|
1590
docs/api-reference/networking.k8s.io/v1/definitions.html
Executable file
1590
docs/api-reference/networking.k8s.io/v1/definitions.html
Executable file
File diff suppressed because it is too large
Load Diff
2095
docs/api-reference/networking.k8s.io/v1/operations.html
Executable file
2095
docs/api-reference/networking.k8s.io/v1/operations.html
Executable file
File diff suppressed because it is too large
Load Diff
@@ -81,6 +81,8 @@ pkg/apis/componentconfig/install
|
|||||||
pkg/apis/extensions/install
|
pkg/apis/extensions/install
|
||||||
pkg/apis/extensions/v1beta1
|
pkg/apis/extensions/v1beta1
|
||||||
pkg/apis/imagepolicy/install
|
pkg/apis/imagepolicy/install
|
||||||
|
pkg/apis/networking/install
|
||||||
|
pkg/apis/networking/validation
|
||||||
pkg/apis/policy/install
|
pkg/apis/policy/install
|
||||||
pkg/apis/rbac/install
|
pkg/apis/rbac/install
|
||||||
pkg/apis/rbac/v1alpha1
|
pkg/apis/rbac/v1alpha1
|
||||||
@@ -108,6 +110,8 @@ pkg/client/informers/informers_generated/externalversions/core
|
|||||||
pkg/client/informers/informers_generated/externalversions/core/v1
|
pkg/client/informers/informers_generated/externalversions/core/v1
|
||||||
pkg/client/informers/informers_generated/externalversions/extensions
|
pkg/client/informers/informers_generated/externalversions/extensions
|
||||||
pkg/client/informers/informers_generated/externalversions/extensions/v1beta1
|
pkg/client/informers/informers_generated/externalversions/extensions/v1beta1
|
||||||
|
pkg/client/informers/informers_generated/externalversions/networking
|
||||||
|
pkg/client/informers/informers_generated/externalversions/networking/v1
|
||||||
pkg/client/informers/informers_generated/externalversions/policy
|
pkg/client/informers/informers_generated/externalversions/policy
|
||||||
pkg/client/informers/informers_generated/externalversions/policy/v1beta1
|
pkg/client/informers/informers_generated/externalversions/policy/v1beta1
|
||||||
pkg/client/informers/informers_generated/externalversions/rbac
|
pkg/client/informers/informers_generated/externalversions/rbac
|
||||||
@@ -133,6 +137,8 @@ pkg/client/informers/informers_generated/internalversion/core
|
|||||||
pkg/client/informers/informers_generated/internalversion/core/internalversion
|
pkg/client/informers/informers_generated/internalversion/core/internalversion
|
||||||
pkg/client/informers/informers_generated/internalversion/extensions
|
pkg/client/informers/informers_generated/internalversion/extensions
|
||||||
pkg/client/informers/informers_generated/internalversion/extensions/internalversion
|
pkg/client/informers/informers_generated/internalversion/extensions/internalversion
|
||||||
|
pkg/client/informers/informers_generated/internalversion/networking
|
||||||
|
pkg/client/informers/informers_generated/internalversion/networking/internalversion
|
||||||
pkg/client/informers/informers_generated/internalversion/policy
|
pkg/client/informers/informers_generated/internalversion/policy
|
||||||
pkg/client/informers/informers_generated/internalversion/policy/internalversion
|
pkg/client/informers/informers_generated/internalversion/policy/internalversion
|
||||||
pkg/client/informers/informers_generated/internalversion/rbac
|
pkg/client/informers/informers_generated/internalversion/rbac
|
||||||
@@ -165,6 +171,8 @@ pkg/client/listers/extensions/internalversion
|
|||||||
pkg/client/listers/extensions/v1beta1
|
pkg/client/listers/extensions/v1beta1
|
||||||
pkg/client/listers/imagepolicy/internalversion
|
pkg/client/listers/imagepolicy/internalversion
|
||||||
pkg/client/listers/imagepolicy/v1alpha1
|
pkg/client/listers/imagepolicy/v1alpha1
|
||||||
|
pkg/client/listers/networking/internalversion
|
||||||
|
pkg/client/listers/networking/v1
|
||||||
pkg/client/listers/policy/internalversion
|
pkg/client/listers/policy/internalversion
|
||||||
pkg/client/listers/policy/v1alpha1
|
pkg/client/listers/policy/v1alpha1
|
||||||
pkg/client/listers/policy/v1beta1
|
pkg/client/listers/policy/v1beta1
|
||||||
@@ -372,6 +380,8 @@ staging/src/k8s.io/client-go/informers/core
|
|||||||
staging/src/k8s.io/client-go/informers/core/v1
|
staging/src/k8s.io/client-go/informers/core/v1
|
||||||
staging/src/k8s.io/client-go/informers/extensions
|
staging/src/k8s.io/client-go/informers/extensions
|
||||||
staging/src/k8s.io/client-go/informers/extensions/v1beta1
|
staging/src/k8s.io/client-go/informers/extensions/v1beta1
|
||||||
|
staging/src/k8s.io/client-go/informers/networking
|
||||||
|
staging/src/k8s.io/client-go/informers/networking/v1
|
||||||
staging/src/k8s.io/client-go/informers/policy
|
staging/src/k8s.io/client-go/informers/policy
|
||||||
staging/src/k8s.io/client-go/informers/policy/v1beta1
|
staging/src/k8s.io/client-go/informers/policy/v1beta1
|
||||||
staging/src/k8s.io/client-go/informers/rbac
|
staging/src/k8s.io/client-go/informers/rbac
|
||||||
@@ -391,6 +401,7 @@ staging/src/k8s.io/client-go/listers/batch/v2alpha1
|
|||||||
staging/src/k8s.io/client-go/listers/certificates/v1beta1
|
staging/src/k8s.io/client-go/listers/certificates/v1beta1
|
||||||
staging/src/k8s.io/client-go/listers/core/v1
|
staging/src/k8s.io/client-go/listers/core/v1
|
||||||
staging/src/k8s.io/client-go/listers/extensions/v1beta1
|
staging/src/k8s.io/client-go/listers/extensions/v1beta1
|
||||||
|
staging/src/k8s.io/client-go/listers/networking/v1
|
||||||
staging/src/k8s.io/client-go/listers/policy/v1beta1
|
staging/src/k8s.io/client-go/listers/policy/v1beta1
|
||||||
staging/src/k8s.io/client-go/listers/rbac/v1alpha1
|
staging/src/k8s.io/client-go/listers/rbac/v1alpha1
|
||||||
staging/src/k8s.io/client-go/listers/rbac/v1beta1
|
staging/src/k8s.io/client-go/listers/rbac/v1beta1
|
||||||
|
1
hack/lib/init.sh
Normal file → Executable file
1
hack/lib/init.sh
Normal file → Executable file
@@ -65,6 +65,7 @@ batch/v2alpha1 \
|
|||||||
certificates.k8s.io/v1beta1 \
|
certificates.k8s.io/v1beta1 \
|
||||||
extensions/v1beta1 \
|
extensions/v1beta1 \
|
||||||
imagepolicy.k8s.io/v1alpha1 \
|
imagepolicy.k8s.io/v1alpha1 \
|
||||||
|
networking.k8s.io/v1 \
|
||||||
policy/v1beta1 \
|
policy/v1beta1 \
|
||||||
rbac.authorization.k8s.io/v1beta1 \
|
rbac.authorization.k8s.io/v1beta1 \
|
||||||
rbac.authorization.k8s.io/v1alpha1 \
|
rbac.authorization.k8s.io/v1alpha1 \
|
||||||
|
@@ -28,6 +28,7 @@ filegroup(
|
|||||||
"//pkg/apis/extensions:all-srcs",
|
"//pkg/apis/extensions:all-srcs",
|
||||||
"//pkg/apis/imagepolicy:all-srcs",
|
"//pkg/apis/imagepolicy:all-srcs",
|
||||||
"//pkg/apis/meta/v1:all-srcs",
|
"//pkg/apis/meta/v1:all-srcs",
|
||||||
|
"//pkg/apis/networking:all-srcs",
|
||||||
"//pkg/apis/policy:all-srcs",
|
"//pkg/apis/policy:all-srcs",
|
||||||
"//pkg/apis/rbac:all-srcs",
|
"//pkg/apis/rbac:all-srcs",
|
||||||
"//pkg/apis/settings:all-srcs",
|
"//pkg/apis/settings:all-srcs",
|
||||||
@@ -68,6 +69,8 @@ filegroup(
|
|||||||
"//pkg/client/listers/extensions/v1beta1:all-srcs",
|
"//pkg/client/listers/extensions/v1beta1:all-srcs",
|
||||||
"//pkg/client/listers/imagepolicy/internalversion:all-srcs",
|
"//pkg/client/listers/imagepolicy/internalversion:all-srcs",
|
||||||
"//pkg/client/listers/imagepolicy/v1alpha1:all-srcs",
|
"//pkg/client/listers/imagepolicy/v1alpha1:all-srcs",
|
||||||
|
"//pkg/client/listers/networking/internalversion:all-srcs",
|
||||||
|
"//pkg/client/listers/networking/v1:all-srcs",
|
||||||
"//pkg/client/listers/policy/internalversion:all-srcs",
|
"//pkg/client/listers/policy/internalversion:all-srcs",
|
||||||
"//pkg/client/listers/policy/v1alpha1:all-srcs",
|
"//pkg/client/listers/policy/v1alpha1:all-srcs",
|
||||||
"//pkg/client/listers/policy/v1beta1:all-srcs",
|
"//pkg/client/listers/policy/v1beta1:all-srcs",
|
||||||
|
@@ -125,6 +125,8 @@ func TestDefaulting(t *testing.T) {
|
|||||||
{Group: "admissionregistration.k8s.io", Version: "v1alpha1", Kind: "InitializerConfigurationList"}: {},
|
{Group: "admissionregistration.k8s.io", Version: "v1alpha1", Kind: "InitializerConfigurationList"}: {},
|
||||||
{Group: "admissionregistration.k8s.io", Version: "v1alpha1", Kind: "ExternalAdmissionHookConfiguration"}: {},
|
{Group: "admissionregistration.k8s.io", Version: "v1alpha1", Kind: "ExternalAdmissionHookConfiguration"}: {},
|
||||||
{Group: "admissionregistration.k8s.io", Version: "v1alpha1", Kind: "ExternalAdmissionHookConfigurationList"}: {},
|
{Group: "admissionregistration.k8s.io", Version: "v1alpha1", Kind: "ExternalAdmissionHookConfigurationList"}: {},
|
||||||
|
{Group: "networking.k8s.io", Version: "v1", Kind: "NetworkPolicy"}: {},
|
||||||
|
{Group: "networking.k8s.io", Version: "v1", Kind: "NetworkPolicyList"}: {},
|
||||||
}
|
}
|
||||||
|
|
||||||
f := fuzz.New().NilChance(.5).NumElements(1, 1).RandSource(rand.NewSource(1))
|
f := fuzz.New().NilChance(.5).NumElements(1, 1).RandSource(rand.NewSource(1))
|
||||||
|
@@ -35,6 +35,8 @@ go_library(
|
|||||||
"//pkg/apis/extensions/install:go_default_library",
|
"//pkg/apis/extensions/install:go_default_library",
|
||||||
"//pkg/apis/imagepolicy:go_default_library",
|
"//pkg/apis/imagepolicy:go_default_library",
|
||||||
"//pkg/apis/imagepolicy/install:go_default_library",
|
"//pkg/apis/imagepolicy/install:go_default_library",
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
|
"//pkg/apis/networking/install:go_default_library",
|
||||||
"//pkg/apis/policy:go_default_library",
|
"//pkg/apis/policy:go_default_library",
|
||||||
"//pkg/apis/policy/install:go_default_library",
|
"//pkg/apis/policy/install:go_default_library",
|
||||||
"//pkg/apis/rbac:go_default_library",
|
"//pkg/apis/rbac:go_default_library",
|
||||||
|
@@ -44,6 +44,7 @@ import (
|
|||||||
"k8s.io/kubernetes/pkg/apis/certificates"
|
"k8s.io/kubernetes/pkg/apis/certificates"
|
||||||
"k8s.io/kubernetes/pkg/apis/extensions"
|
"k8s.io/kubernetes/pkg/apis/extensions"
|
||||||
"k8s.io/kubernetes/pkg/apis/imagepolicy"
|
"k8s.io/kubernetes/pkg/apis/imagepolicy"
|
||||||
|
"k8s.io/kubernetes/pkg/apis/networking"
|
||||||
"k8s.io/kubernetes/pkg/apis/policy"
|
"k8s.io/kubernetes/pkg/apis/policy"
|
||||||
"k8s.io/kubernetes/pkg/apis/rbac"
|
"k8s.io/kubernetes/pkg/apis/rbac"
|
||||||
"k8s.io/kubernetes/pkg/apis/settings"
|
"k8s.io/kubernetes/pkg/apis/settings"
|
||||||
@@ -61,6 +62,7 @@ import (
|
|||||||
_ "k8s.io/kubernetes/pkg/apis/componentconfig/install"
|
_ "k8s.io/kubernetes/pkg/apis/componentconfig/install"
|
||||||
_ "k8s.io/kubernetes/pkg/apis/extensions/install"
|
_ "k8s.io/kubernetes/pkg/apis/extensions/install"
|
||||||
_ "k8s.io/kubernetes/pkg/apis/imagepolicy/install"
|
_ "k8s.io/kubernetes/pkg/apis/imagepolicy/install"
|
||||||
|
_ "k8s.io/kubernetes/pkg/apis/networking/install"
|
||||||
_ "k8s.io/kubernetes/pkg/apis/policy/install"
|
_ "k8s.io/kubernetes/pkg/apis/policy/install"
|
||||||
_ "k8s.io/kubernetes/pkg/apis/rbac/install"
|
_ "k8s.io/kubernetes/pkg/apis/rbac/install"
|
||||||
_ "k8s.io/kubernetes/pkg/apis/settings/install"
|
_ "k8s.io/kubernetes/pkg/apis/settings/install"
|
||||||
@@ -82,6 +84,7 @@ var (
|
|||||||
Settings TestGroup
|
Settings TestGroup
|
||||||
Storage TestGroup
|
Storage TestGroup
|
||||||
ImagePolicy TestGroup
|
ImagePolicy TestGroup
|
||||||
|
Networking TestGroup
|
||||||
|
|
||||||
serializer runtime.SerializerInfo
|
serializer runtime.SerializerInfo
|
||||||
storageSerializer runtime.SerializerInfo
|
storageSerializer runtime.SerializerInfo
|
||||||
@@ -289,6 +292,16 @@ func init() {
|
|||||||
externalTypes: api.Scheme.KnownTypes(externalGroupVersion),
|
externalTypes: api.Scheme.KnownTypes(externalGroupVersion),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
if _, ok := Groups[networking.GroupName]; !ok {
|
||||||
|
externalGroupVersion := schema.GroupVersion{Group: networking.GroupName, Version: api.Registry.GroupOrDie(networking.GroupName).GroupVersion.Version}
|
||||||
|
Groups[networking.GroupName] = TestGroup{
|
||||||
|
externalGroupVersion: externalGroupVersion,
|
||||||
|
internalGroupVersion: networking.SchemeGroupVersion,
|
||||||
|
internalTypes: api.Scheme.KnownTypes(networking.SchemeGroupVersion),
|
||||||
|
externalTypes: api.Scheme.KnownTypes(externalGroupVersion),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
Default = Groups[api.GroupName]
|
Default = Groups[api.GroupName]
|
||||||
Autoscaling = Groups[autoscaling.GroupName]
|
Autoscaling = Groups[autoscaling.GroupName]
|
||||||
Batch = Groups[batch.GroupName]
|
Batch = Groups[batch.GroupName]
|
||||||
@@ -302,6 +315,7 @@ func init() {
|
|||||||
Storage = Groups[storage.GroupName]
|
Storage = Groups[storage.GroupName]
|
||||||
ImagePolicy = Groups[imagepolicy.GroupName]
|
ImagePolicy = Groups[imagepolicy.GroupName]
|
||||||
Authorization = Groups[authorization.GroupName]
|
Authorization = Groups[authorization.GroupName]
|
||||||
|
Networking = Groups[networking.GroupName]
|
||||||
}
|
}
|
||||||
|
|
||||||
func (g TestGroup) ContentConfig() (string, *schema.GroupVersion, runtime.Codec) {
|
func (g TestGroup) ContentConfig() (string, *schema.GroupVersion, runtime.Codec) {
|
||||||
|
@@ -1042,6 +1042,7 @@ type PodSecurityPolicyList struct {
|
|||||||
|
|
||||||
// +genclient=true
|
// +genclient=true
|
||||||
|
|
||||||
|
// NetworkPolicy describes what network traffic is allowed for a set of Pods
|
||||||
type NetworkPolicy struct {
|
type NetworkPolicy struct {
|
||||||
metav1.TypeMeta
|
metav1.TypeMeta
|
||||||
// +optional
|
// +optional
|
||||||
@@ -1061,13 +1062,12 @@ type NetworkPolicySpec struct {
|
|||||||
PodSelector metav1.LabelSelector
|
PodSelector metav1.LabelSelector
|
||||||
|
|
||||||
// List of ingress rules to be applied to the selected pods.
|
// List of ingress rules to be applied to the selected pods.
|
||||||
// Traffic is allowed to a pod if namespace.networkPolicy.ingress.isolation is undefined and cluster policy allows it,
|
// Traffic is allowed to a pod if there are no NetworkPolicies selecting the pod
|
||||||
// OR if the traffic source is the pod's local node,
|
// OR if the traffic source is the pod's local node,
|
||||||
// OR if the traffic matches at least one ingress rule across all of the NetworkPolicy
|
// OR if the traffic matches at least one ingress rule across all of the NetworkPolicy
|
||||||
// objects whose podSelector matches the pod.
|
// objects whose podSelector matches the pod.
|
||||||
// If this field is empty then this NetworkPolicy does not affect ingress isolation.
|
// If this field is empty then this NetworkPolicy does not allow any traffic
|
||||||
// If this field is present and contains at least one rule, this policy allows any traffic
|
// (and serves solely to ensure that the pods it selects are isolated by default).
|
||||||
// which matches at least one of the ingress rules in this list.
|
|
||||||
// +optional
|
// +optional
|
||||||
Ingress []NetworkPolicyIngressRule
|
Ingress []NetworkPolicyIngressRule
|
||||||
}
|
}
|
||||||
|
@@ -28,6 +28,7 @@ go_library(
|
|||||||
"//pkg/api:go_default_library",
|
"//pkg/api:go_default_library",
|
||||||
"//pkg/api/v1:go_default_library",
|
"//pkg/api/v1:go_default_library",
|
||||||
"//pkg/apis/extensions:go_default_library",
|
"//pkg/apis/extensions:go_default_library",
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
"//vendor/github.com/gogo/protobuf/proto:go_default_library",
|
"//vendor/github.com/gogo/protobuf/proto:go_default_library",
|
||||||
"//vendor/github.com/gogo/protobuf/sortkeys:go_default_library",
|
"//vendor/github.com/gogo/protobuf/sortkeys:go_default_library",
|
||||||
"//vendor/github.com/ugorji/go/codec:go_default_library",
|
"//vendor/github.com/ugorji/go/codec:go_default_library",
|
||||||
|
@@ -23,8 +23,10 @@ import (
|
|||||||
"k8s.io/apimachinery/pkg/conversion"
|
"k8s.io/apimachinery/pkg/conversion"
|
||||||
"k8s.io/apimachinery/pkg/runtime"
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
"k8s.io/apimachinery/pkg/util/intstr"
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
|
"k8s.io/kubernetes/pkg/api"
|
||||||
v1 "k8s.io/kubernetes/pkg/api/v1"
|
v1 "k8s.io/kubernetes/pkg/api/v1"
|
||||||
"k8s.io/kubernetes/pkg/apis/extensions"
|
"k8s.io/kubernetes/pkg/apis/extensions"
|
||||||
|
"k8s.io/kubernetes/pkg/apis/networking"
|
||||||
)
|
)
|
||||||
|
|
||||||
func addConversionFuncs(scheme *runtime.Scheme) error {
|
func addConversionFuncs(scheme *runtime.Scheme) error {
|
||||||
@@ -42,6 +44,18 @@ func addConversionFuncs(scheme *runtime.Scheme) error {
|
|||||||
Convert_v1beta1_RollingUpdateDaemonSet_To_extensions_RollingUpdateDaemonSet,
|
Convert_v1beta1_RollingUpdateDaemonSet_To_extensions_RollingUpdateDaemonSet,
|
||||||
Convert_extensions_ReplicaSetSpec_To_v1beta1_ReplicaSetSpec,
|
Convert_extensions_ReplicaSetSpec_To_v1beta1_ReplicaSetSpec,
|
||||||
Convert_v1beta1_ReplicaSetSpec_To_extensions_ReplicaSetSpec,
|
Convert_v1beta1_ReplicaSetSpec_To_extensions_ReplicaSetSpec,
|
||||||
|
Convert_v1beta1_NetworkPolicy_To_networking_NetworkPolicy,
|
||||||
|
Convert_networking_NetworkPolicy_To_v1beta1_NetworkPolicy,
|
||||||
|
Convert_v1beta1_NetworkPolicyIngressRule_To_networking_NetworkPolicyIngressRule,
|
||||||
|
Convert_networking_NetworkPolicyIngressRule_To_v1beta1_NetworkPolicyIngressRule,
|
||||||
|
Convert_v1beta1_NetworkPolicyList_To_networking_NetworkPolicyList,
|
||||||
|
Convert_networking_NetworkPolicyList_To_v1beta1_NetworkPolicyList,
|
||||||
|
Convert_v1beta1_NetworkPolicyPeer_To_networking_NetworkPolicyPeer,
|
||||||
|
Convert_networking_NetworkPolicyPeer_To_v1beta1_NetworkPolicyPeer,
|
||||||
|
Convert_v1beta1_NetworkPolicyPort_To_networking_NetworkPolicyPort,
|
||||||
|
Convert_networking_NetworkPolicyPort_To_v1beta1_NetworkPolicyPort,
|
||||||
|
Convert_v1beta1_NetworkPolicySpec_To_networking_NetworkPolicySpec,
|
||||||
|
Convert_networking_NetworkPolicySpec_To_v1beta1_NetworkPolicySpec,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@@ -260,3 +274,155 @@ func Convert_v1beta1_ReplicaSetSpec_To_extensions_ReplicaSetSpec(in *ReplicaSetS
|
|||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func Convert_v1beta1_NetworkPolicy_To_networking_NetworkPolicy(in *NetworkPolicy, out *networking.NetworkPolicy, s conversion.Scope) error {
|
||||||
|
out.ObjectMeta = in.ObjectMeta
|
||||||
|
return Convert_v1beta1_NetworkPolicySpec_To_networking_NetworkPolicySpec(&in.Spec, &out.Spec, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_networking_NetworkPolicy_To_v1beta1_NetworkPolicy(in *networking.NetworkPolicy, out *NetworkPolicy, s conversion.Scope) error {
|
||||||
|
out.ObjectMeta = in.ObjectMeta
|
||||||
|
return Convert_networking_NetworkPolicySpec_To_v1beta1_NetworkPolicySpec(&in.Spec, &out.Spec, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_v1beta1_NetworkPolicySpec_To_networking_NetworkPolicySpec(in *NetworkPolicySpec, out *networking.NetworkPolicySpec, s conversion.Scope) error {
|
||||||
|
if err := s.Convert(&in.PodSelector, &out.PodSelector, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
out.Ingress = make([]networking.NetworkPolicyIngressRule, len(in.Ingress))
|
||||||
|
for i := range in.Ingress {
|
||||||
|
if err := Convert_v1beta1_NetworkPolicyIngressRule_To_networking_NetworkPolicyIngressRule(&in.Ingress[i], &out.Ingress[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_networking_NetworkPolicySpec_To_v1beta1_NetworkPolicySpec(in *networking.NetworkPolicySpec, out *NetworkPolicySpec, s conversion.Scope) error {
|
||||||
|
if err := s.Convert(&in.PodSelector, &out.PodSelector, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
out.Ingress = make([]NetworkPolicyIngressRule, len(in.Ingress))
|
||||||
|
for i := range in.Ingress {
|
||||||
|
if err := Convert_networking_NetworkPolicyIngressRule_To_v1beta1_NetworkPolicyIngressRule(&in.Ingress[i], &out.Ingress[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_v1beta1_NetworkPolicyIngressRule_To_networking_NetworkPolicyIngressRule(in *NetworkPolicyIngressRule, out *networking.NetworkPolicyIngressRule, s conversion.Scope) error {
|
||||||
|
out.Ports = make([]networking.NetworkPolicyPort, len(in.Ports))
|
||||||
|
for i := range in.Ports {
|
||||||
|
if err := Convert_v1beta1_NetworkPolicyPort_To_networking_NetworkPolicyPort(&in.Ports[i], &out.Ports[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
out.From = make([]networking.NetworkPolicyPeer, len(in.From))
|
||||||
|
for i := range in.From {
|
||||||
|
if err := Convert_v1beta1_NetworkPolicyPeer_To_networking_NetworkPolicyPeer(&in.From[i], &out.From[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_networking_NetworkPolicyIngressRule_To_v1beta1_NetworkPolicyIngressRule(in *networking.NetworkPolicyIngressRule, out *NetworkPolicyIngressRule, s conversion.Scope) error {
|
||||||
|
out.Ports = make([]NetworkPolicyPort, len(in.Ports))
|
||||||
|
for i := range in.Ports {
|
||||||
|
if err := Convert_networking_NetworkPolicyPort_To_v1beta1_NetworkPolicyPort(&in.Ports[i], &out.Ports[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
out.From = make([]NetworkPolicyPeer, len(in.From))
|
||||||
|
for i := range in.From {
|
||||||
|
if err := Convert_networking_NetworkPolicyPeer_To_v1beta1_NetworkPolicyPeer(&in.From[i], &out.From[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_v1beta1_NetworkPolicyPeer_To_networking_NetworkPolicyPeer(in *NetworkPolicyPeer, out *networking.NetworkPolicyPeer, s conversion.Scope) error {
|
||||||
|
if in.PodSelector != nil {
|
||||||
|
out.PodSelector = new(metav1.LabelSelector)
|
||||||
|
if err := s.Convert(in.PodSelector, out.PodSelector, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
out.PodSelector = nil
|
||||||
|
}
|
||||||
|
if in.NamespaceSelector != nil {
|
||||||
|
out.NamespaceSelector = new(metav1.LabelSelector)
|
||||||
|
if err := s.Convert(in.NamespaceSelector, out.NamespaceSelector, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
out.NamespaceSelector = nil
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_networking_NetworkPolicyPeer_To_v1beta1_NetworkPolicyPeer(in *networking.NetworkPolicyPeer, out *NetworkPolicyPeer, s conversion.Scope) error {
|
||||||
|
if in.PodSelector != nil {
|
||||||
|
out.PodSelector = new(metav1.LabelSelector)
|
||||||
|
if err := s.Convert(in.PodSelector, out.PodSelector, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
out.PodSelector = nil
|
||||||
|
}
|
||||||
|
if in.NamespaceSelector != nil {
|
||||||
|
out.NamespaceSelector = new(metav1.LabelSelector)
|
||||||
|
if err := s.Convert(in.NamespaceSelector, out.NamespaceSelector, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
out.NamespaceSelector = nil
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_v1beta1_NetworkPolicyPort_To_networking_NetworkPolicyPort(in *NetworkPolicyPort, out *networking.NetworkPolicyPort, s conversion.Scope) error {
|
||||||
|
if in.Protocol != nil {
|
||||||
|
out.Protocol = new(api.Protocol)
|
||||||
|
*out.Protocol = api.Protocol(*in.Protocol)
|
||||||
|
} else {
|
||||||
|
out.Protocol = nil
|
||||||
|
}
|
||||||
|
out.Port = in.Port
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_networking_NetworkPolicyPort_To_v1beta1_NetworkPolicyPort(in *networking.NetworkPolicyPort, out *NetworkPolicyPort, s conversion.Scope) error {
|
||||||
|
if in.Protocol != nil {
|
||||||
|
out.Protocol = new(v1.Protocol)
|
||||||
|
*out.Protocol = v1.Protocol(*in.Protocol)
|
||||||
|
} else {
|
||||||
|
out.Protocol = nil
|
||||||
|
}
|
||||||
|
out.Port = in.Port
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_v1beta1_NetworkPolicyList_To_networking_NetworkPolicyList(in *NetworkPolicyList, out *networking.NetworkPolicyList, s conversion.Scope) error {
|
||||||
|
out.ListMeta = in.ListMeta
|
||||||
|
out.Items = make([]networking.NetworkPolicy, len(in.Items))
|
||||||
|
for i := range in.Items {
|
||||||
|
if err := Convert_v1beta1_NetworkPolicy_To_networking_NetworkPolicy(&in.Items[i], &out.Items[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_networking_NetworkPolicyList_To_v1beta1_NetworkPolicyList(in *networking.NetworkPolicyList, out *NetworkPolicyList, s conversion.Scope) error {
|
||||||
|
out.ListMeta = in.ListMeta
|
||||||
|
out.Items = make([]NetworkPolicy, len(in.Items))
|
||||||
|
for i := range in.Items {
|
||||||
|
if err := Convert_networking_NetworkPolicy_To_v1beta1_NetworkPolicy(&in.Items[i], &out.Items[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
@@ -18,6 +18,7 @@ limitations under the License.
|
|||||||
// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/extensions
|
// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/extensions
|
||||||
// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/autoscaling
|
// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/autoscaling
|
||||||
// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/batch
|
// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/batch
|
||||||
|
// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/networking
|
||||||
// +k8s:openapi-gen=true
|
// +k8s:openapi-gen=true
|
||||||
// +k8s:defaulter-gen=TypeMeta
|
// +k8s:defaulter-gen=TypeMeta
|
||||||
|
|
||||||
|
@@ -532,6 +532,7 @@ message IngressTLS {
|
|||||||
optional string secretName = 2;
|
optional string secretName = 2;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NetworkPolicy describes what network traffic is allowed for a set of Pods
|
||||||
message NetworkPolicy {
|
message NetworkPolicy {
|
||||||
// Standard object's metadata.
|
// Standard object's metadata.
|
||||||
// More info: https://github.com/kubernetes/community/blob/master/contributors/devel/api-conventions.md#metadata
|
// More info: https://github.com/kubernetes/community/blob/master/contributors/devel/api-conventions.md#metadata
|
||||||
@@ -612,13 +613,12 @@ message NetworkPolicySpec {
|
|||||||
optional k8s.io.apimachinery.pkg.apis.meta.v1.LabelSelector podSelector = 1;
|
optional k8s.io.apimachinery.pkg.apis.meta.v1.LabelSelector podSelector = 1;
|
||||||
|
|
||||||
// List of ingress rules to be applied to the selected pods.
|
// List of ingress rules to be applied to the selected pods.
|
||||||
// Traffic is allowed to a pod if namespace.networkPolicy.ingress.isolation is undefined and cluster policy allows it,
|
// Traffic is allowed to a pod if there are no NetworkPolicies selecting the pod
|
||||||
// OR if the traffic source is the pod's local node,
|
// OR if the traffic source is the pod's local node,
|
||||||
// OR if the traffic matches at least one ingress rule across all of the NetworkPolicy
|
// OR if the traffic matches at least one ingress rule across all of the NetworkPolicy
|
||||||
// objects whose podSelector matches the pod.
|
// objects whose podSelector matches the pod.
|
||||||
// If this field is empty then this NetworkPolicy does not affect ingress isolation.
|
// If this field is empty then this NetworkPolicy does not allow any traffic
|
||||||
// If this field is present and contains at least one rule, this policy allows any traffic
|
// (and serves solely to ensure that the pods it selects are isolated by default).
|
||||||
// which matches at least one of the ingress rules in this list.
|
|
||||||
// +optional
|
// +optional
|
||||||
repeated NetworkPolicyIngressRule ingress = 2;
|
repeated NetworkPolicyIngressRule ingress = 2;
|
||||||
}
|
}
|
||||||
|
@@ -1055,6 +1055,7 @@ type PodSecurityPolicyList struct {
|
|||||||
Items []PodSecurityPolicy `json:"items" protobuf:"bytes,2,rep,name=items"`
|
Items []PodSecurityPolicy `json:"items" protobuf:"bytes,2,rep,name=items"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NetworkPolicy describes what network traffic is allowed for a set of Pods
|
||||||
type NetworkPolicy struct {
|
type NetworkPolicy struct {
|
||||||
metav1.TypeMeta `json:",inline"`
|
metav1.TypeMeta `json:",inline"`
|
||||||
// Standard object's metadata.
|
// Standard object's metadata.
|
||||||
@@ -1076,13 +1077,12 @@ type NetworkPolicySpec struct {
|
|||||||
PodSelector metav1.LabelSelector `json:"podSelector" protobuf:"bytes,1,opt,name=podSelector"`
|
PodSelector metav1.LabelSelector `json:"podSelector" protobuf:"bytes,1,opt,name=podSelector"`
|
||||||
|
|
||||||
// List of ingress rules to be applied to the selected pods.
|
// List of ingress rules to be applied to the selected pods.
|
||||||
// Traffic is allowed to a pod if namespace.networkPolicy.ingress.isolation is undefined and cluster policy allows it,
|
// Traffic is allowed to a pod if there are no NetworkPolicies selecting the pod
|
||||||
// OR if the traffic source is the pod's local node,
|
// OR if the traffic source is the pod's local node,
|
||||||
// OR if the traffic matches at least one ingress rule across all of the NetworkPolicy
|
// OR if the traffic matches at least one ingress rule across all of the NetworkPolicy
|
||||||
// objects whose podSelector matches the pod.
|
// objects whose podSelector matches the pod.
|
||||||
// If this field is empty then this NetworkPolicy does not affect ingress isolation.
|
// If this field is empty then this NetworkPolicy does not allow any traffic
|
||||||
// If this field is present and contains at least one rule, this policy allows any traffic
|
// (and serves solely to ensure that the pods it selects are isolated by default).
|
||||||
// which matches at least one of the ingress rules in this list.
|
|
||||||
// +optional
|
// +optional
|
||||||
Ingress []NetworkPolicyIngressRule `json:"ingress,omitempty" protobuf:"bytes,2,rep,name=ingress"`
|
Ingress []NetworkPolicyIngressRule `json:"ingress,omitempty" protobuf:"bytes,2,rep,name=ingress"`
|
||||||
}
|
}
|
||||||
|
@@ -331,6 +331,7 @@ func (IngressTLS) SwaggerDoc() map[string]string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
var map_NetworkPolicy = map[string]string{
|
var map_NetworkPolicy = map[string]string{
|
||||||
|
"": "NetworkPolicy describes what network traffic is allowed for a set of Pods",
|
||||||
"metadata": "Standard object's metadata. More info: https://github.com/kubernetes/community/blob/master/contributors/devel/api-conventions.md#metadata",
|
"metadata": "Standard object's metadata. More info: https://github.com/kubernetes/community/blob/master/contributors/devel/api-conventions.md#metadata",
|
||||||
"spec": "Specification of the desired behavior for this NetworkPolicy.",
|
"spec": "Specification of the desired behavior for this NetworkPolicy.",
|
||||||
}
|
}
|
||||||
@@ -379,7 +380,7 @@ func (NetworkPolicyPort) SwaggerDoc() map[string]string {
|
|||||||
|
|
||||||
var map_NetworkPolicySpec = map[string]string{
|
var map_NetworkPolicySpec = map[string]string{
|
||||||
"podSelector": "Selects the pods to which this NetworkPolicy object applies. The array of ingress rules is applied to any pods selected by this field. Multiple network policies can select the same set of pods. In this case, the ingress rules for each are combined additively. This field is NOT optional and follows standard label selector semantics. An empty podSelector matches all pods in this namespace.",
|
"podSelector": "Selects the pods to which this NetworkPolicy object applies. The array of ingress rules is applied to any pods selected by this field. Multiple network policies can select the same set of pods. In this case, the ingress rules for each are combined additively. This field is NOT optional and follows standard label selector semantics. An empty podSelector matches all pods in this namespace.",
|
||||||
"ingress": "List of ingress rules to be applied to the selected pods. Traffic is allowed to a pod if namespace.networkPolicy.ingress.isolation is undefined and cluster policy allows it, OR if the traffic source is the pod's local node, OR if the traffic matches at least one ingress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy does not affect ingress isolation. If this field is present and contains at least one rule, this policy allows any traffic which matches at least one of the ingress rules in this list.",
|
"ingress": "List of ingress rules to be applied to the selected pods. Traffic is allowed to a pod if there are no NetworkPolicies selecting the pod OR if the traffic source is the pod's local node, OR if the traffic matches at least one ingress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy does not allow any traffic (and serves solely to ensure that the pods it selects are isolated by default).",
|
||||||
}
|
}
|
||||||
|
|
||||||
func (NetworkPolicySpec) SwaggerDoc() map[string]string {
|
func (NetworkPolicySpec) SwaggerDoc() map[string]string {
|
||||||
|
45
pkg/apis/networking/BUILD
Normal file
45
pkg/apis/networking/BUILD
Normal file
@@ -0,0 +1,45 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = [
|
||||||
|
"doc.go",
|
||||||
|
"register.go",
|
||||||
|
"types.go",
|
||||||
|
"zz_generated.deepcopy.go",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/api:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/conversion:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/runtime:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/runtime/schema:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/util/intstr:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [
|
||||||
|
":package-srcs",
|
||||||
|
"//pkg/apis/networking/install:all-srcs",
|
||||||
|
"//pkg/apis/networking/v1:all-srcs",
|
||||||
|
"//pkg/apis/networking/validation:all-srcs",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
4
pkg/apis/networking/OWNERS
Executable file
4
pkg/apis/networking/OWNERS
Executable file
@@ -0,0 +1,4 @@
|
|||||||
|
reviewers:
|
||||||
|
- caseydavenport
|
||||||
|
- danwinship
|
||||||
|
- thockin
|
19
pkg/apis/networking/doc.go
Normal file
19
pkg/apis/networking/doc.go
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// +k8s:deepcopy-gen=package,register
|
||||||
|
// +groupName=networking.k8s.io
|
||||||
|
package networking // import "k8s.io/kubernetes/pkg/apis/networking"
|
35
pkg/apis/networking/install/BUILD
Normal file
35
pkg/apis/networking/install/BUILD
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = ["install.go"],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/api:go_default_library",
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
|
"//pkg/apis/networking/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/apimachinery/announced:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/apimachinery/registered:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/runtime:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [":package-srcs"],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
49
pkg/apis/networking/install/install.go
Normal file
49
pkg/apis/networking/install/install.go
Normal file
@@ -0,0 +1,49 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Package install installs the experimental API group, making it available as
|
||||||
|
// an option to all of the API encoding/decoding machinery.
|
||||||
|
package install
|
||||||
|
|
||||||
|
import (
|
||||||
|
"k8s.io/apimachinery/pkg/apimachinery/announced"
|
||||||
|
"k8s.io/apimachinery/pkg/apimachinery/registered"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
"k8s.io/kubernetes/pkg/api"
|
||||||
|
"k8s.io/kubernetes/pkg/apis/networking"
|
||||||
|
"k8s.io/kubernetes/pkg/apis/networking/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
Install(api.GroupFactoryRegistry, api.Registry, api.Scheme)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Install registers the API group and adds types to a scheme
|
||||||
|
func Install(groupFactoryRegistry announced.APIGroupFactoryRegistry, registry *registered.APIRegistrationManager, scheme *runtime.Scheme) {
|
||||||
|
if err := announced.NewGroupMetaFactory(
|
||||||
|
&announced.GroupMetaFactoryArgs{
|
||||||
|
GroupName: networking.GroupName,
|
||||||
|
VersionPreferenceOrder: []string{v1.SchemeGroupVersion.Version},
|
||||||
|
ImportPrefix: "k8s.io/kubernetes/pkg/apis/networking",
|
||||||
|
AddInternalObjectsToScheme: networking.AddToScheme,
|
||||||
|
},
|
||||||
|
announced.VersionToSchemeFunc{
|
||||||
|
v1.SchemeGroupVersion.Version: v1.AddToScheme,
|
||||||
|
},
|
||||||
|
).Announce(groupFactoryRegistry).RegisterAndEnable(registry, scheme); err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
}
|
51
pkg/apis/networking/register.go
Normal file
51
pkg/apis/networking/register.go
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package networking
|
||||||
|
|
||||||
|
import (
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
)
|
||||||
|
|
||||||
|
// GroupName is the group name use in this package
|
||||||
|
const GroupName = "networking.k8s.io"
|
||||||
|
|
||||||
|
// SchemeGroupVersion is group version used to register these objects
|
||||||
|
var SchemeGroupVersion = schema.GroupVersion{Group: GroupName, Version: runtime.APIVersionInternal}
|
||||||
|
|
||||||
|
// Kind takes an unqualified kind and returns a Group qualified GroupKind
|
||||||
|
func Kind(kind string) schema.GroupKind {
|
||||||
|
return SchemeGroupVersion.WithKind(kind).GroupKind()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Resource takes an unqualified resource and returns a Group qualified GroupResource
|
||||||
|
func Resource(resource string) schema.GroupResource {
|
||||||
|
return SchemeGroupVersion.WithResource(resource).GroupResource()
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
SchemeBuilder = runtime.NewSchemeBuilder(addKnownTypes)
|
||||||
|
AddToScheme = SchemeBuilder.AddToScheme
|
||||||
|
)
|
||||||
|
|
||||||
|
func addKnownTypes(scheme *runtime.Scheme) error {
|
||||||
|
scheme.AddKnownTypes(SchemeGroupVersion,
|
||||||
|
&NetworkPolicy{},
|
||||||
|
&NetworkPolicyList{},
|
||||||
|
)
|
||||||
|
return nil
|
||||||
|
}
|
115
pkg/apis/networking/types.go
Normal file
115
pkg/apis/networking/types.go
Normal file
@@ -0,0 +1,115 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package networking
|
||||||
|
|
||||||
|
import (
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
|
"k8s.io/kubernetes/pkg/api"
|
||||||
|
)
|
||||||
|
|
||||||
|
// +genclient=true
|
||||||
|
|
||||||
|
// NetworkPolicy describes what network traffic is allowed for a set of Pods
|
||||||
|
type NetworkPolicy struct {
|
||||||
|
metav1.TypeMeta
|
||||||
|
// +optional
|
||||||
|
metav1.ObjectMeta
|
||||||
|
|
||||||
|
// Specification of the desired behavior for this NetworkPolicy.
|
||||||
|
// +optional
|
||||||
|
Spec NetworkPolicySpec
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicySpec provides the specification of a NetworkPolicy
|
||||||
|
type NetworkPolicySpec struct {
|
||||||
|
// Selects the pods to which this NetworkPolicy object applies. The array of
|
||||||
|
// ingress rules is applied to any pods selected by this field. Multiple network
|
||||||
|
// policies can select the same set of pods. In this case, the ingress rules for
|
||||||
|
// each are combined additively. This field is NOT optional and follows standard
|
||||||
|
// label selector semantics. An empty podSelector matches all pods in this
|
||||||
|
// namespace.
|
||||||
|
PodSelector metav1.LabelSelector
|
||||||
|
|
||||||
|
// List of ingress rules to be applied to the selected pods. Traffic is allowed to
|
||||||
|
// a pod if there are no NetworkPolicies selecting the pod
|
||||||
|
// (and cluster policy otherwise allows the traffic), OR if the traffic source is
|
||||||
|
// the pod's local node, OR if the traffic matches at least one ingress rule
|
||||||
|
// across all of the NetworkPolicy objects whose podSelector matches the pod. If
|
||||||
|
// this field is empty then this NetworkPolicy does not allow any traffic (and serves
|
||||||
|
// solely to ensure that the pods it selects are isolated by default)
|
||||||
|
// +optional
|
||||||
|
Ingress []NetworkPolicyIngressRule
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyIngressRule describes a particular set of traffic that is allowed to the pods
|
||||||
|
// matched by a NetworkPolicySpec's podSelector. The traffic must match both ports and from.
|
||||||
|
type NetworkPolicyIngressRule struct {
|
||||||
|
// List of ports which should be made accessible on the pods selected for this
|
||||||
|
// rule. Each item in this list is combined using a logical OR. If this field is
|
||||||
|
// empty or missing, this rule matches all ports (traffic not restricted by port).
|
||||||
|
// If this field is present and contains at least one item, then this rule allows
|
||||||
|
// traffic only if the traffic matches at least one port in the list.
|
||||||
|
// +optional
|
||||||
|
Ports []NetworkPolicyPort
|
||||||
|
|
||||||
|
// List of sources which should be able to access the pods selected for this rule.
|
||||||
|
// Items in this list are combined using a logical OR operation. If this field is
|
||||||
|
// empty or missing, this rule matches all sources (traffic not restricted by
|
||||||
|
// source). If this field is present and contains at least on item, this rule
|
||||||
|
// allows traffic only if the traffic matches at least one item in the from list.
|
||||||
|
// +optional
|
||||||
|
From []NetworkPolicyPeer
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyPort describes a port to allow traffic on
|
||||||
|
type NetworkPolicyPort struct {
|
||||||
|
// The protocol (TCP or UDP) which traffic must match. If not specified, this
|
||||||
|
// field defaults to TCP.
|
||||||
|
// +optional
|
||||||
|
Protocol *api.Protocol
|
||||||
|
|
||||||
|
// The port on the given protocol. This can either be a numerical or named port on
|
||||||
|
// a pod. If this field is not provided, this matches all port names and numbers.
|
||||||
|
// +optional
|
||||||
|
Port *intstr.IntOrString
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyPeer describes a peer to allow traffic from. Exactly one of its fields
|
||||||
|
// must be specified.
|
||||||
|
type NetworkPolicyPeer struct {
|
||||||
|
// This is a label selector which selects Pods in this namespace. This field
|
||||||
|
// follows standard label selector semantics. If present but empty, this selector
|
||||||
|
// selects all pods in this namespace.
|
||||||
|
// +optional
|
||||||
|
PodSelector *metav1.LabelSelector
|
||||||
|
|
||||||
|
// Selects Namespaces using cluster scoped-labels. This matches all pods in all
|
||||||
|
// namespaces selected by this label selector. This field follows standard label
|
||||||
|
// selector semantics. If present but empty, this selector selects all namespaces.
|
||||||
|
// +optional
|
||||||
|
NamespaceSelector *metav1.LabelSelector
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyList is a list of NetworkPolicy objects.
|
||||||
|
type NetworkPolicyList struct {
|
||||||
|
metav1.TypeMeta
|
||||||
|
// +optional
|
||||||
|
metav1.ListMeta
|
||||||
|
|
||||||
|
Items []NetworkPolicy
|
||||||
|
}
|
53
pkg/apis/networking/v1/BUILD
Normal file
53
pkg/apis/networking/v1/BUILD
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = [
|
||||||
|
"conversion.go",
|
||||||
|
"defaults.go",
|
||||||
|
"doc.go",
|
||||||
|
"generated.pb.go",
|
||||||
|
"register.go",
|
||||||
|
"types.generated.go",
|
||||||
|
"types.go",
|
||||||
|
"types_swagger_doc_generated.go",
|
||||||
|
"zz_generated.conversion.go",
|
||||||
|
"zz_generated.deepcopy.go",
|
||||||
|
"zz_generated.defaults.go",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/api:go_default_library",
|
||||||
|
"//pkg/api/v1:go_default_library",
|
||||||
|
"//pkg/apis/extensions:go_default_library",
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
|
"//vendor/github.com/gogo/protobuf/proto:go_default_library",
|
||||||
|
"//vendor/github.com/ugorji/go/codec:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/conversion:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/runtime:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/runtime/schema:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/types:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/util/intstr:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [":package-srcs"],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
195
pkg/apis/networking/v1/conversion.go
Normal file
195
pkg/apis/networking/v1/conversion.go
Normal file
@@ -0,0 +1,195 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
import (
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/conversion"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
"k8s.io/kubernetes/pkg/api"
|
||||||
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
|
"k8s.io/kubernetes/pkg/apis/extensions"
|
||||||
|
)
|
||||||
|
|
||||||
|
func addConversionFuncs(scheme *runtime.Scheme) error {
|
||||||
|
return scheme.AddConversionFuncs(
|
||||||
|
Convert_v1_NetworkPolicy_To_extensions_NetworkPolicy,
|
||||||
|
Convert_extensions_NetworkPolicy_To_v1_NetworkPolicy,
|
||||||
|
Convert_v1_NetworkPolicyIngressRule_To_extensions_NetworkPolicyIngressRule,
|
||||||
|
Convert_extensions_NetworkPolicyIngressRule_To_v1_NetworkPolicyIngressRule,
|
||||||
|
Convert_v1_NetworkPolicyList_To_extensions_NetworkPolicyList,
|
||||||
|
Convert_extensions_NetworkPolicyList_To_v1_NetworkPolicyList,
|
||||||
|
Convert_v1_NetworkPolicyPeer_To_extensions_NetworkPolicyPeer,
|
||||||
|
Convert_extensions_NetworkPolicyPeer_To_v1_NetworkPolicyPeer,
|
||||||
|
Convert_v1_NetworkPolicyPort_To_extensions_NetworkPolicyPort,
|
||||||
|
Convert_extensions_NetworkPolicyPort_To_v1_NetworkPolicyPort,
|
||||||
|
Convert_v1_NetworkPolicySpec_To_extensions_NetworkPolicySpec,
|
||||||
|
Convert_extensions_NetworkPolicySpec_To_v1_NetworkPolicySpec,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_v1_NetworkPolicy_To_extensions_NetworkPolicy(in *NetworkPolicy, out *extensions.NetworkPolicy, s conversion.Scope) error {
|
||||||
|
out.ObjectMeta = in.ObjectMeta
|
||||||
|
return Convert_v1_NetworkPolicySpec_To_extensions_NetworkPolicySpec(&in.Spec, &out.Spec, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_extensions_NetworkPolicy_To_v1_NetworkPolicy(in *extensions.NetworkPolicy, out *NetworkPolicy, s conversion.Scope) error {
|
||||||
|
out.ObjectMeta = in.ObjectMeta
|
||||||
|
return Convert_extensions_NetworkPolicySpec_To_v1_NetworkPolicySpec(&in.Spec, &out.Spec, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_v1_NetworkPolicySpec_To_extensions_NetworkPolicySpec(in *NetworkPolicySpec, out *extensions.NetworkPolicySpec, s conversion.Scope) error {
|
||||||
|
if err := s.Convert(&in.PodSelector, &out.PodSelector, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
out.Ingress = make([]extensions.NetworkPolicyIngressRule, len(in.Ingress))
|
||||||
|
for i := range in.Ingress {
|
||||||
|
if err := Convert_v1_NetworkPolicyIngressRule_To_extensions_NetworkPolicyIngressRule(&in.Ingress[i], &out.Ingress[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_extensions_NetworkPolicySpec_To_v1_NetworkPolicySpec(in *extensions.NetworkPolicySpec, out *NetworkPolicySpec, s conversion.Scope) error {
|
||||||
|
if err := s.Convert(&in.PodSelector, &out.PodSelector, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
out.Ingress = make([]NetworkPolicyIngressRule, len(in.Ingress))
|
||||||
|
for i := range in.Ingress {
|
||||||
|
if err := Convert_extensions_NetworkPolicyIngressRule_To_v1_NetworkPolicyIngressRule(&in.Ingress[i], &out.Ingress[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_v1_NetworkPolicyIngressRule_To_extensions_NetworkPolicyIngressRule(in *NetworkPolicyIngressRule, out *extensions.NetworkPolicyIngressRule, s conversion.Scope) error {
|
||||||
|
out.Ports = make([]extensions.NetworkPolicyPort, len(in.Ports))
|
||||||
|
for i := range in.Ports {
|
||||||
|
if err := Convert_v1_NetworkPolicyPort_To_extensions_NetworkPolicyPort(&in.Ports[i], &out.Ports[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
out.From = make([]extensions.NetworkPolicyPeer, len(in.From))
|
||||||
|
for i := range in.From {
|
||||||
|
if err := Convert_v1_NetworkPolicyPeer_To_extensions_NetworkPolicyPeer(&in.From[i], &out.From[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_extensions_NetworkPolicyIngressRule_To_v1_NetworkPolicyIngressRule(in *extensions.NetworkPolicyIngressRule, out *NetworkPolicyIngressRule, s conversion.Scope) error {
|
||||||
|
out.Ports = make([]NetworkPolicyPort, len(in.Ports))
|
||||||
|
for i := range in.Ports {
|
||||||
|
if err := Convert_extensions_NetworkPolicyPort_To_v1_NetworkPolicyPort(&in.Ports[i], &out.Ports[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
out.From = make([]NetworkPolicyPeer, len(in.From))
|
||||||
|
for i := range in.From {
|
||||||
|
if err := Convert_extensions_NetworkPolicyPeer_To_v1_NetworkPolicyPeer(&in.From[i], &out.From[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_v1_NetworkPolicyPeer_To_extensions_NetworkPolicyPeer(in *NetworkPolicyPeer, out *extensions.NetworkPolicyPeer, s conversion.Scope) error {
|
||||||
|
if in.PodSelector != nil {
|
||||||
|
out.PodSelector = new(metav1.LabelSelector)
|
||||||
|
if err := s.Convert(in.PodSelector, out.PodSelector, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
out.PodSelector = nil
|
||||||
|
}
|
||||||
|
if in.NamespaceSelector != nil {
|
||||||
|
out.NamespaceSelector = new(metav1.LabelSelector)
|
||||||
|
if err := s.Convert(in.NamespaceSelector, out.NamespaceSelector, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
out.NamespaceSelector = nil
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_extensions_NetworkPolicyPeer_To_v1_NetworkPolicyPeer(in *extensions.NetworkPolicyPeer, out *NetworkPolicyPeer, s conversion.Scope) error {
|
||||||
|
if in.PodSelector != nil {
|
||||||
|
out.PodSelector = new(metav1.LabelSelector)
|
||||||
|
if err := s.Convert(in.PodSelector, out.PodSelector, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
out.PodSelector = nil
|
||||||
|
}
|
||||||
|
if in.NamespaceSelector != nil {
|
||||||
|
out.NamespaceSelector = new(metav1.LabelSelector)
|
||||||
|
if err := s.Convert(in.NamespaceSelector, out.NamespaceSelector, 0); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
out.NamespaceSelector = nil
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_v1_NetworkPolicyPort_To_extensions_NetworkPolicyPort(in *NetworkPolicyPort, out *extensions.NetworkPolicyPort, s conversion.Scope) error {
|
||||||
|
if in.Protocol != nil {
|
||||||
|
out.Protocol = new(api.Protocol)
|
||||||
|
*out.Protocol = api.Protocol(*in.Protocol)
|
||||||
|
} else {
|
||||||
|
out.Protocol = nil
|
||||||
|
}
|
||||||
|
out.Port = in.Port
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_extensions_NetworkPolicyPort_To_v1_NetworkPolicyPort(in *extensions.NetworkPolicyPort, out *NetworkPolicyPort, s conversion.Scope) error {
|
||||||
|
if in.Protocol != nil {
|
||||||
|
out.Protocol = new(v1.Protocol)
|
||||||
|
*out.Protocol = v1.Protocol(*in.Protocol)
|
||||||
|
} else {
|
||||||
|
out.Protocol = nil
|
||||||
|
}
|
||||||
|
out.Port = in.Port
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_v1_NetworkPolicyList_To_extensions_NetworkPolicyList(in *NetworkPolicyList, out *extensions.NetworkPolicyList, s conversion.Scope) error {
|
||||||
|
out.ListMeta = in.ListMeta
|
||||||
|
out.Items = make([]extensions.NetworkPolicy, len(in.Items))
|
||||||
|
for i := range in.Items {
|
||||||
|
if err := Convert_v1_NetworkPolicy_To_extensions_NetworkPolicy(&in.Items[i], &out.Items[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Convert_extensions_NetworkPolicyList_To_v1_NetworkPolicyList(in *extensions.NetworkPolicyList, out *NetworkPolicyList, s conversion.Scope) error {
|
||||||
|
out.ListMeta = in.ListMeta
|
||||||
|
out.Items = make([]NetworkPolicy, len(in.Items))
|
||||||
|
for i := range in.Items {
|
||||||
|
if err := Convert_extensions_NetworkPolicy_To_v1_NetworkPolicy(&in.Items[i], &out.Items[i], s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
34
pkg/apis/networking/v1/defaults.go
Normal file
34
pkg/apis/networking/v1/defaults.go
Normal file
@@ -0,0 +1,34 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
import (
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
func addDefaultingFuncs(scheme *runtime.Scheme) error {
|
||||||
|
return RegisterDefaults(scheme)
|
||||||
|
}
|
||||||
|
|
||||||
|
func SetDefaults_NetworkPolicyPort(obj *NetworkPolicyPort) {
|
||||||
|
// Default any undefined Protocol fields to TCP.
|
||||||
|
if obj.Protocol == nil {
|
||||||
|
proto := v1.ProtocolTCP
|
||||||
|
obj.Protocol = &proto
|
||||||
|
}
|
||||||
|
}
|
22
pkg/apis/networking/v1/doc.go
Normal file
22
pkg/apis/networking/v1/doc.go
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// +k8s:deepcopy-gen=package,register
|
||||||
|
// +k8s:conversion-gen=k8s.io/kubernetes/pkg/apis/networking
|
||||||
|
// +k8s:openapi-gen=true
|
||||||
|
// +k8s:defaulter-gen=TypeMeta
|
||||||
|
// +groupName=networking.k8s.io
|
||||||
|
package v1 // import "k8s.io/kubernetes/pkg/apis/networking/v1"
|
1345
pkg/apis/networking/v1/generated.pb.go
Normal file
1345
pkg/apis/networking/v1/generated.pb.go
Normal file
File diff suppressed because it is too large
Load Diff
127
pkg/apis/networking/v1/generated.proto
Normal file
127
pkg/apis/networking/v1/generated.proto
Normal file
@@ -0,0 +1,127 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
// This file was autogenerated by go-to-protobuf. Do not edit it manually!
|
||||||
|
|
||||||
|
syntax = 'proto2';
|
||||||
|
|
||||||
|
package k8s.io.kubernetes.pkg.apis.networking.v1;
|
||||||
|
|
||||||
|
import "k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto";
|
||||||
|
import "k8s.io/apimachinery/pkg/runtime/generated.proto";
|
||||||
|
import "k8s.io/apimachinery/pkg/runtime/schema/generated.proto";
|
||||||
|
import "k8s.io/apimachinery/pkg/util/intstr/generated.proto";
|
||||||
|
import "k8s.io/kubernetes/pkg/api/v1/generated.proto";
|
||||||
|
import "k8s.io/kubernetes/pkg/apis/extensions/v1beta1/generated.proto";
|
||||||
|
import "k8s.io/kubernetes/pkg/apis/policy/v1beta1/generated.proto";
|
||||||
|
|
||||||
|
// Package-wide variables from generator "generated".
|
||||||
|
option go_package = "v1";
|
||||||
|
|
||||||
|
// NetworkPolicy describes what network traffic is allowed for a set of Pods
|
||||||
|
message NetworkPolicy {
|
||||||
|
// Standard object's metadata.
|
||||||
|
// More info: http://releases.k8s.io/HEAD/docs/devel/api-conventions.md#metadata
|
||||||
|
// +optional
|
||||||
|
optional k8s.io.apimachinery.pkg.apis.meta.v1.ObjectMeta metadata = 1;
|
||||||
|
|
||||||
|
// Specification of the desired behavior for this NetworkPolicy.
|
||||||
|
// +optional
|
||||||
|
optional NetworkPolicySpec spec = 2;
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyIngressRule describes a particular set of traffic that is allowed to the pods
|
||||||
|
// matched by a NetworkPolicySpec's podSelector. The traffic must match both ports and from.
|
||||||
|
message NetworkPolicyIngressRule {
|
||||||
|
// List of ports which should be made accessible on the pods selected for this
|
||||||
|
// rule. Each item in this list is combined using a logical OR. If this field is
|
||||||
|
// empty or missing, this rule matches all ports (traffic not restricted by port).
|
||||||
|
// If this field is present and contains at least one item, then this rule allows
|
||||||
|
// traffic only if the traffic matches at least one port in the list.
|
||||||
|
// +optional
|
||||||
|
repeated NetworkPolicyPort ports = 1;
|
||||||
|
|
||||||
|
// List of sources which should be able to access the pods selected for this rule.
|
||||||
|
// Items in this list are combined using a logical OR operation. If this field is
|
||||||
|
// empty or missing, this rule matches all sources (traffic not restricted by
|
||||||
|
// source). If this field is present and contains at least on item, this rule
|
||||||
|
// allows traffic only if the traffic matches at least one item in the from list.
|
||||||
|
// +optional
|
||||||
|
repeated NetworkPolicyPeer from = 2;
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyList is a list of NetworkPolicy objects.
|
||||||
|
message NetworkPolicyList {
|
||||||
|
// Standard list metadata.
|
||||||
|
// More info: http://releases.k8s.io/HEAD/docs/devel/api-conventions.md#metadata
|
||||||
|
// +optional
|
||||||
|
optional k8s.io.apimachinery.pkg.apis.meta.v1.ListMeta metadata = 1;
|
||||||
|
|
||||||
|
// Items is a list of schema objects.
|
||||||
|
repeated NetworkPolicy items = 2;
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyPeer describes a peer to allow traffic from. Exactly one of its fields
|
||||||
|
// must be specified.
|
||||||
|
message NetworkPolicyPeer {
|
||||||
|
// This is a label selector which selects Pods in this namespace. This field
|
||||||
|
// follows standard label selector semantics. If present but empty, this selector
|
||||||
|
// selects all pods in this namespace.
|
||||||
|
// +optional
|
||||||
|
optional k8s.io.apimachinery.pkg.apis.meta.v1.LabelSelector podSelector = 1;
|
||||||
|
|
||||||
|
// Selects Namespaces using cluster scoped-labels. This matches all pods in all
|
||||||
|
// namespaces selected by this label selector. This field follows standard label
|
||||||
|
// selector semantics. If present but empty, this selector selects all namespaces.
|
||||||
|
// +optional
|
||||||
|
optional k8s.io.apimachinery.pkg.apis.meta.v1.LabelSelector namespaceSelector = 2;
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyPort describes a port to allow traffic on
|
||||||
|
message NetworkPolicyPort {
|
||||||
|
// The protocol (TCP or UDP) which traffic must match. If not specified, this
|
||||||
|
// field defaults to TCP.
|
||||||
|
// +optional
|
||||||
|
optional string protocol = 1;
|
||||||
|
|
||||||
|
// The port on the given protocol. This can either be a numerical or named port on
|
||||||
|
// a pod. If this field is not provided, this matches all port names and numbers.
|
||||||
|
// +optional
|
||||||
|
optional k8s.io.apimachinery.pkg.util.intstr.IntOrString port = 2;
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicySpec provides the specification of a NetworkPolicy
|
||||||
|
message NetworkPolicySpec {
|
||||||
|
// Selects the pods to which this NetworkPolicy object applies. The array of
|
||||||
|
// ingress rules is applied to any pods selected by this field. Multiple network
|
||||||
|
// policies can select the same set of pods. In this case, the ingress rules for
|
||||||
|
// each are combined additively. This field is NOT optional and follows standard
|
||||||
|
// label selector semantics. An empty podSelector matches all pods in this
|
||||||
|
// namespace.
|
||||||
|
optional k8s.io.apimachinery.pkg.apis.meta.v1.LabelSelector podSelector = 1;
|
||||||
|
|
||||||
|
// List of ingress rules to be applied to the selected pods. Traffic is allowed to
|
||||||
|
// a pod if there are no NetworkPolicies selecting the pod
|
||||||
|
// (and cluster policy otherwise allows the traffic), OR if the traffic source is
|
||||||
|
// the pod's local node, OR if the traffic matches at least one ingress rule
|
||||||
|
// across all of the NetworkPolicy objects whose podSelector matches the pod. If
|
||||||
|
// this field is empty then this NetworkPolicy does not allow any traffic (and serves
|
||||||
|
// solely to ensure that the pods it selects are isolated by default)
|
||||||
|
// +optional
|
||||||
|
repeated NetworkPolicyIngressRule ingress = 2;
|
||||||
|
}
|
||||||
|
|
50
pkg/apis/networking/v1/register.go
Normal file
50
pkg/apis/networking/v1/register.go
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
import (
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
)
|
||||||
|
|
||||||
|
// GroupName is the group name use in this package
|
||||||
|
const GroupName = "networking.k8s.io"
|
||||||
|
|
||||||
|
// SchemeGroupVersion is group version used to register these objects
|
||||||
|
var SchemeGroupVersion = schema.GroupVersion{Group: GroupName, Version: "v1"}
|
||||||
|
|
||||||
|
// Resource takes an unqualified resource and returns a Group qualified GroupResource
|
||||||
|
func Resource(resource string) schema.GroupResource {
|
||||||
|
return SchemeGroupVersion.WithResource(resource).GroupResource()
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
SchemeBuilder = runtime.NewSchemeBuilder(addKnownTypes, addDefaultingFuncs, addConversionFuncs)
|
||||||
|
AddToScheme = SchemeBuilder.AddToScheme
|
||||||
|
)
|
||||||
|
|
||||||
|
// Adds the list of known types to api.Scheme.
|
||||||
|
func addKnownTypes(scheme *runtime.Scheme) error {
|
||||||
|
scheme.AddKnownTypes(SchemeGroupVersion,
|
||||||
|
&NetworkPolicy{},
|
||||||
|
&NetworkPolicyList{},
|
||||||
|
)
|
||||||
|
|
||||||
|
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
|
||||||
|
return nil
|
||||||
|
}
|
2322
pkg/apis/networking/v1/types.generated.go
Normal file
2322
pkg/apis/networking/v1/types.generated.go
Normal file
File diff suppressed because it is too large
Load Diff
120
pkg/apis/networking/v1/types.go
Normal file
120
pkg/apis/networking/v1/types.go
Normal file
@@ -0,0 +1,120 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
import (
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
// +genclient=true
|
||||||
|
|
||||||
|
// NetworkPolicy describes what network traffic is allowed for a set of Pods
|
||||||
|
type NetworkPolicy struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
// Standard object's metadata.
|
||||||
|
// More info: http://releases.k8s.io/HEAD/docs/devel/api-conventions.md#metadata
|
||||||
|
// +optional
|
||||||
|
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||||
|
|
||||||
|
// Specification of the desired behavior for this NetworkPolicy.
|
||||||
|
// +optional
|
||||||
|
Spec NetworkPolicySpec `json:"spec,omitempty" protobuf:"bytes,2,opt,name=spec"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicySpec provides the specification of a NetworkPolicy
|
||||||
|
type NetworkPolicySpec struct {
|
||||||
|
// Selects the pods to which this NetworkPolicy object applies. The array of
|
||||||
|
// ingress rules is applied to any pods selected by this field. Multiple network
|
||||||
|
// policies can select the same set of pods. In this case, the ingress rules for
|
||||||
|
// each are combined additively. This field is NOT optional and follows standard
|
||||||
|
// label selector semantics. An empty podSelector matches all pods in this
|
||||||
|
// namespace.
|
||||||
|
PodSelector metav1.LabelSelector `json:"podSelector" protobuf:"bytes,1,opt,name=podSelector"`
|
||||||
|
|
||||||
|
// List of ingress rules to be applied to the selected pods. Traffic is allowed to
|
||||||
|
// a pod if there are no NetworkPolicies selecting the pod
|
||||||
|
// (and cluster policy otherwise allows the traffic), OR if the traffic source is
|
||||||
|
// the pod's local node, OR if the traffic matches at least one ingress rule
|
||||||
|
// across all of the NetworkPolicy objects whose podSelector matches the pod. If
|
||||||
|
// this field is empty then this NetworkPolicy does not allow any traffic (and serves
|
||||||
|
// solely to ensure that the pods it selects are isolated by default)
|
||||||
|
// +optional
|
||||||
|
Ingress []NetworkPolicyIngressRule `json:"ingress,omitempty" protobuf:"bytes,2,rep,name=ingress"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyIngressRule describes a particular set of traffic that is allowed to the pods
|
||||||
|
// matched by a NetworkPolicySpec's podSelector. The traffic must match both ports and from.
|
||||||
|
type NetworkPolicyIngressRule struct {
|
||||||
|
// List of ports which should be made accessible on the pods selected for this
|
||||||
|
// rule. Each item in this list is combined using a logical OR. If this field is
|
||||||
|
// empty or missing, this rule matches all ports (traffic not restricted by port).
|
||||||
|
// If this field is present and contains at least one item, then this rule allows
|
||||||
|
// traffic only if the traffic matches at least one port in the list.
|
||||||
|
// +optional
|
||||||
|
Ports []NetworkPolicyPort `json:"ports,omitempty" protobuf:"bytes,1,rep,name=ports"`
|
||||||
|
|
||||||
|
// List of sources which should be able to access the pods selected for this rule.
|
||||||
|
// Items in this list are combined using a logical OR operation. If this field is
|
||||||
|
// empty or missing, this rule matches all sources (traffic not restricted by
|
||||||
|
// source). If this field is present and contains at least on item, this rule
|
||||||
|
// allows traffic only if the traffic matches at least one item in the from list.
|
||||||
|
// +optional
|
||||||
|
From []NetworkPolicyPeer `json:"from,omitempty" protobuf:"bytes,2,rep,name=from"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyPort describes a port to allow traffic on
|
||||||
|
type NetworkPolicyPort struct {
|
||||||
|
// The protocol (TCP or UDP) which traffic must match. If not specified, this
|
||||||
|
// field defaults to TCP.
|
||||||
|
// +optional
|
||||||
|
Protocol *v1.Protocol `json:"protocol,omitempty" protobuf:"bytes,1,opt,name=protocol,casttype=k8s.io/kubernetes/pkg/api/v1.Protocol"`
|
||||||
|
|
||||||
|
// The port on the given protocol. This can either be a numerical or named port on
|
||||||
|
// a pod. If this field is not provided, this matches all port names and numbers.
|
||||||
|
// +optional
|
||||||
|
Port *intstr.IntOrString `json:"port,omitempty" protobuf:"bytes,2,opt,name=port"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyPeer describes a peer to allow traffic from. Exactly one of its fields
|
||||||
|
// must be specified.
|
||||||
|
type NetworkPolicyPeer struct {
|
||||||
|
// This is a label selector which selects Pods in this namespace. This field
|
||||||
|
// follows standard label selector semantics. If present but empty, this selector
|
||||||
|
// selects all pods in this namespace.
|
||||||
|
// +optional
|
||||||
|
PodSelector *metav1.LabelSelector `json:"podSelector,omitempty" protobuf:"bytes,1,opt,name=podSelector"`
|
||||||
|
|
||||||
|
// Selects Namespaces using cluster scoped-labels. This matches all pods in all
|
||||||
|
// namespaces selected by this label selector. This field follows standard label
|
||||||
|
// selector semantics. If present but empty, this selector selects all namespaces.
|
||||||
|
// +optional
|
||||||
|
NamespaceSelector *metav1.LabelSelector `json:"namespaceSelector,omitempty" protobuf:"bytes,2,opt,name=namespaceSelector"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyList is a list of NetworkPolicy objects.
|
||||||
|
type NetworkPolicyList struct {
|
||||||
|
metav1.TypeMeta `json:",inline"`
|
||||||
|
// Standard list metadata.
|
||||||
|
// More info: http://releases.k8s.io/HEAD/docs/devel/api-conventions.md#metadata
|
||||||
|
// +optional
|
||||||
|
metav1.ListMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
||||||
|
|
||||||
|
// Items is a list of schema objects.
|
||||||
|
Items []NetworkPolicy `json:"items" protobuf:"bytes,2,rep,name=items"`
|
||||||
|
}
|
90
pkg/apis/networking/v1/types_swagger_doc_generated.go
Normal file
90
pkg/apis/networking/v1/types_swagger_doc_generated.go
Normal file
@@ -0,0 +1,90 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2016 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
// This file contains a collection of methods that can be used from go-restful to
|
||||||
|
// generate Swagger API documentation for its models. Please read this PR for more
|
||||||
|
// information on the implementation: https://github.com/emicklei/go-restful/pull/215
|
||||||
|
//
|
||||||
|
// TODOs are ignored from the parser (e.g. TODO(andronat):... || TODO:...) if and only if
|
||||||
|
// they are on one line! For multiple line or blocks that you want to ignore use ---.
|
||||||
|
// Any context after a --- is ignored.
|
||||||
|
//
|
||||||
|
// Those methods can be generated by using hack/update-generated-swagger-docs.sh
|
||||||
|
|
||||||
|
// AUTO-GENERATED FUNCTIONS START HERE
|
||||||
|
var map_NetworkPolicy = map[string]string{
|
||||||
|
"": "NetworkPolicy describes what network traffic is allowed for a set of Pods",
|
||||||
|
"metadata": "Standard object's metadata. More info: http://releases.k8s.io/HEAD/docs/devel/api-conventions.md#metadata",
|
||||||
|
"spec": "Specification of the desired behavior for this NetworkPolicy.",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (NetworkPolicy) SwaggerDoc() map[string]string {
|
||||||
|
return map_NetworkPolicy
|
||||||
|
}
|
||||||
|
|
||||||
|
var map_NetworkPolicyIngressRule = map[string]string{
|
||||||
|
"": "NetworkPolicyIngressRule describes a particular set of traffic that is allowed to the pods matched by a NetworkPolicySpec's podSelector. The traffic must match both ports and from.",
|
||||||
|
"ports": "List of ports which should be made accessible on the pods selected for this rule. Each item in this list is combined using a logical OR. If this field is empty or missing, this rule matches all ports (traffic not restricted by port). If this field is present and contains at least one item, then this rule allows traffic only if the traffic matches at least one port in the list.",
|
||||||
|
"from": "List of sources which should be able to access the pods selected for this rule. Items in this list are combined using a logical OR operation. If this field is empty or missing, this rule matches all sources (traffic not restricted by source). If this field is present and contains at least on item, this rule allows traffic only if the traffic matches at least one item in the from list.",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (NetworkPolicyIngressRule) SwaggerDoc() map[string]string {
|
||||||
|
return map_NetworkPolicyIngressRule
|
||||||
|
}
|
||||||
|
|
||||||
|
var map_NetworkPolicyList = map[string]string{
|
||||||
|
"": "NetworkPolicyList is a list of NetworkPolicy objects.",
|
||||||
|
"metadata": "Standard list metadata. More info: http://releases.k8s.io/HEAD/docs/devel/api-conventions.md#metadata",
|
||||||
|
"items": "Items is a list of schema objects.",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (NetworkPolicyList) SwaggerDoc() map[string]string {
|
||||||
|
return map_NetworkPolicyList
|
||||||
|
}
|
||||||
|
|
||||||
|
var map_NetworkPolicyPeer = map[string]string{
|
||||||
|
"": "NetworkPolicyPeer describes a peer to allow traffic from. Exactly one of its fields must be specified.",
|
||||||
|
"podSelector": "This is a label selector which selects Pods in this namespace. This field follows standard label selector semantics. If present but empty, this selector selects all pods in this namespace.",
|
||||||
|
"namespaceSelector": "Selects Namespaces using cluster scoped-labels. This matches all pods in all namespaces selected by this label selector. This field follows standard label selector semantics. If present but empty, this selector selects all namespaces.",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (NetworkPolicyPeer) SwaggerDoc() map[string]string {
|
||||||
|
return map_NetworkPolicyPeer
|
||||||
|
}
|
||||||
|
|
||||||
|
var map_NetworkPolicyPort = map[string]string{
|
||||||
|
"": "NetworkPolicyPort describes a port to allow traffic on",
|
||||||
|
"protocol": "The protocol (TCP or UDP) which traffic must match. If not specified, this field defaults to TCP.",
|
||||||
|
"port": "The port on the given protocol. This can either be a numerical or named port on a pod. If this field is not provided, this matches all port names and numbers.",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (NetworkPolicyPort) SwaggerDoc() map[string]string {
|
||||||
|
return map_NetworkPolicyPort
|
||||||
|
}
|
||||||
|
|
||||||
|
var map_NetworkPolicySpec = map[string]string{
|
||||||
|
"": "NetworkPolicySpec provides the specification of a NetworkPolicy",
|
||||||
|
"podSelector": "Selects the pods to which this NetworkPolicy object applies. The array of ingress rules is applied to any pods selected by this field. Multiple network policies can select the same set of pods. In this case, the ingress rules for each are combined additively. This field is NOT optional and follows standard label selector semantics. An empty podSelector matches all pods in this namespace.",
|
||||||
|
"ingress": "List of ingress rules to be applied to the selected pods. Traffic is allowed to a pod if there are no NetworkPolicies selecting the pod (and cluster policy otherwise allows the traffic), OR if the traffic source is the pod's local node, OR if the traffic matches at least one ingress rule across all of the NetworkPolicy objects whose podSelector matches the pod. If this field is empty then this NetworkPolicy does not allow any traffic (and serves solely to ensure that the pods it selects are isolated by default)",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (NetworkPolicySpec) SwaggerDoc() map[string]string {
|
||||||
|
return map_NetworkPolicySpec
|
||||||
|
}
|
||||||
|
|
||||||
|
// AUTO-GENERATED FUNCTIONS END HERE
|
195
pkg/apis/networking/v1/zz_generated.conversion.go
Normal file
195
pkg/apis/networking/v1/zz_generated.conversion.go
Normal file
@@ -0,0 +1,195 @@
|
|||||||
|
// +build !ignore_autogenerated
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This file was autogenerated by conversion-gen. Do not edit it manually!
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
import (
|
||||||
|
meta_v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
conversion "k8s.io/apimachinery/pkg/conversion"
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
intstr "k8s.io/apimachinery/pkg/util/intstr"
|
||||||
|
api "k8s.io/kubernetes/pkg/api"
|
||||||
|
api_v1 "k8s.io/kubernetes/pkg/api/v1"
|
||||||
|
networking "k8s.io/kubernetes/pkg/apis/networking"
|
||||||
|
unsafe "unsafe"
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
SchemeBuilder.Register(RegisterConversions)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RegisterConversions adds conversion functions to the given scheme.
|
||||||
|
// Public to allow building arbitrary schemes.
|
||||||
|
func RegisterConversions(scheme *runtime.Scheme) error {
|
||||||
|
return scheme.AddGeneratedConversionFuncs(
|
||||||
|
Convert_v1_NetworkPolicy_To_networking_NetworkPolicy,
|
||||||
|
Convert_networking_NetworkPolicy_To_v1_NetworkPolicy,
|
||||||
|
Convert_v1_NetworkPolicyIngressRule_To_networking_NetworkPolicyIngressRule,
|
||||||
|
Convert_networking_NetworkPolicyIngressRule_To_v1_NetworkPolicyIngressRule,
|
||||||
|
Convert_v1_NetworkPolicyList_To_networking_NetworkPolicyList,
|
||||||
|
Convert_networking_NetworkPolicyList_To_v1_NetworkPolicyList,
|
||||||
|
Convert_v1_NetworkPolicyPeer_To_networking_NetworkPolicyPeer,
|
||||||
|
Convert_networking_NetworkPolicyPeer_To_v1_NetworkPolicyPeer,
|
||||||
|
Convert_v1_NetworkPolicyPort_To_networking_NetworkPolicyPort,
|
||||||
|
Convert_networking_NetworkPolicyPort_To_v1_NetworkPolicyPort,
|
||||||
|
Convert_v1_NetworkPolicySpec_To_networking_NetworkPolicySpec,
|
||||||
|
Convert_networking_NetworkPolicySpec_To_v1_NetworkPolicySpec,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_v1_NetworkPolicy_To_networking_NetworkPolicy(in *NetworkPolicy, out *networking.NetworkPolicy, s conversion.Scope) error {
|
||||||
|
out.ObjectMeta = in.ObjectMeta
|
||||||
|
if err := Convert_v1_NetworkPolicySpec_To_networking_NetworkPolicySpec(&in.Spec, &out.Spec, s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_v1_NetworkPolicy_To_networking_NetworkPolicy is an autogenerated conversion function.
|
||||||
|
func Convert_v1_NetworkPolicy_To_networking_NetworkPolicy(in *NetworkPolicy, out *networking.NetworkPolicy, s conversion.Scope) error {
|
||||||
|
return autoConvert_v1_NetworkPolicy_To_networking_NetworkPolicy(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_networking_NetworkPolicy_To_v1_NetworkPolicy(in *networking.NetworkPolicy, out *NetworkPolicy, s conversion.Scope) error {
|
||||||
|
out.ObjectMeta = in.ObjectMeta
|
||||||
|
if err := Convert_networking_NetworkPolicySpec_To_v1_NetworkPolicySpec(&in.Spec, &out.Spec, s); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_networking_NetworkPolicy_To_v1_NetworkPolicy is an autogenerated conversion function.
|
||||||
|
func Convert_networking_NetworkPolicy_To_v1_NetworkPolicy(in *networking.NetworkPolicy, out *NetworkPolicy, s conversion.Scope) error {
|
||||||
|
return autoConvert_networking_NetworkPolicy_To_v1_NetworkPolicy(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_v1_NetworkPolicyIngressRule_To_networking_NetworkPolicyIngressRule(in *NetworkPolicyIngressRule, out *networking.NetworkPolicyIngressRule, s conversion.Scope) error {
|
||||||
|
out.Ports = *(*[]networking.NetworkPolicyPort)(unsafe.Pointer(&in.Ports))
|
||||||
|
out.From = *(*[]networking.NetworkPolicyPeer)(unsafe.Pointer(&in.From))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_v1_NetworkPolicyIngressRule_To_networking_NetworkPolicyIngressRule is an autogenerated conversion function.
|
||||||
|
func Convert_v1_NetworkPolicyIngressRule_To_networking_NetworkPolicyIngressRule(in *NetworkPolicyIngressRule, out *networking.NetworkPolicyIngressRule, s conversion.Scope) error {
|
||||||
|
return autoConvert_v1_NetworkPolicyIngressRule_To_networking_NetworkPolicyIngressRule(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_networking_NetworkPolicyIngressRule_To_v1_NetworkPolicyIngressRule(in *networking.NetworkPolicyIngressRule, out *NetworkPolicyIngressRule, s conversion.Scope) error {
|
||||||
|
out.Ports = *(*[]NetworkPolicyPort)(unsafe.Pointer(&in.Ports))
|
||||||
|
out.From = *(*[]NetworkPolicyPeer)(unsafe.Pointer(&in.From))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_networking_NetworkPolicyIngressRule_To_v1_NetworkPolicyIngressRule is an autogenerated conversion function.
|
||||||
|
func Convert_networking_NetworkPolicyIngressRule_To_v1_NetworkPolicyIngressRule(in *networking.NetworkPolicyIngressRule, out *NetworkPolicyIngressRule, s conversion.Scope) error {
|
||||||
|
return autoConvert_networking_NetworkPolicyIngressRule_To_v1_NetworkPolicyIngressRule(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_v1_NetworkPolicyList_To_networking_NetworkPolicyList(in *NetworkPolicyList, out *networking.NetworkPolicyList, s conversion.Scope) error {
|
||||||
|
out.ListMeta = in.ListMeta
|
||||||
|
out.Items = *(*[]networking.NetworkPolicy)(unsafe.Pointer(&in.Items))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_v1_NetworkPolicyList_To_networking_NetworkPolicyList is an autogenerated conversion function.
|
||||||
|
func Convert_v1_NetworkPolicyList_To_networking_NetworkPolicyList(in *NetworkPolicyList, out *networking.NetworkPolicyList, s conversion.Scope) error {
|
||||||
|
return autoConvert_v1_NetworkPolicyList_To_networking_NetworkPolicyList(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_networking_NetworkPolicyList_To_v1_NetworkPolicyList(in *networking.NetworkPolicyList, out *NetworkPolicyList, s conversion.Scope) error {
|
||||||
|
out.ListMeta = in.ListMeta
|
||||||
|
if in.Items == nil {
|
||||||
|
out.Items = make([]NetworkPolicy, 0)
|
||||||
|
} else {
|
||||||
|
out.Items = *(*[]NetworkPolicy)(unsafe.Pointer(&in.Items))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_networking_NetworkPolicyList_To_v1_NetworkPolicyList is an autogenerated conversion function.
|
||||||
|
func Convert_networking_NetworkPolicyList_To_v1_NetworkPolicyList(in *networking.NetworkPolicyList, out *NetworkPolicyList, s conversion.Scope) error {
|
||||||
|
return autoConvert_networking_NetworkPolicyList_To_v1_NetworkPolicyList(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_v1_NetworkPolicyPeer_To_networking_NetworkPolicyPeer(in *NetworkPolicyPeer, out *networking.NetworkPolicyPeer, s conversion.Scope) error {
|
||||||
|
out.PodSelector = (*meta_v1.LabelSelector)(unsafe.Pointer(in.PodSelector))
|
||||||
|
out.NamespaceSelector = (*meta_v1.LabelSelector)(unsafe.Pointer(in.NamespaceSelector))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_v1_NetworkPolicyPeer_To_networking_NetworkPolicyPeer is an autogenerated conversion function.
|
||||||
|
func Convert_v1_NetworkPolicyPeer_To_networking_NetworkPolicyPeer(in *NetworkPolicyPeer, out *networking.NetworkPolicyPeer, s conversion.Scope) error {
|
||||||
|
return autoConvert_v1_NetworkPolicyPeer_To_networking_NetworkPolicyPeer(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_networking_NetworkPolicyPeer_To_v1_NetworkPolicyPeer(in *networking.NetworkPolicyPeer, out *NetworkPolicyPeer, s conversion.Scope) error {
|
||||||
|
out.PodSelector = (*meta_v1.LabelSelector)(unsafe.Pointer(in.PodSelector))
|
||||||
|
out.NamespaceSelector = (*meta_v1.LabelSelector)(unsafe.Pointer(in.NamespaceSelector))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_networking_NetworkPolicyPeer_To_v1_NetworkPolicyPeer is an autogenerated conversion function.
|
||||||
|
func Convert_networking_NetworkPolicyPeer_To_v1_NetworkPolicyPeer(in *networking.NetworkPolicyPeer, out *NetworkPolicyPeer, s conversion.Scope) error {
|
||||||
|
return autoConvert_networking_NetworkPolicyPeer_To_v1_NetworkPolicyPeer(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_v1_NetworkPolicyPort_To_networking_NetworkPolicyPort(in *NetworkPolicyPort, out *networking.NetworkPolicyPort, s conversion.Scope) error {
|
||||||
|
out.Protocol = (*api.Protocol)(unsafe.Pointer(in.Protocol))
|
||||||
|
out.Port = (*intstr.IntOrString)(unsafe.Pointer(in.Port))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_v1_NetworkPolicyPort_To_networking_NetworkPolicyPort is an autogenerated conversion function.
|
||||||
|
func Convert_v1_NetworkPolicyPort_To_networking_NetworkPolicyPort(in *NetworkPolicyPort, out *networking.NetworkPolicyPort, s conversion.Scope) error {
|
||||||
|
return autoConvert_v1_NetworkPolicyPort_To_networking_NetworkPolicyPort(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_networking_NetworkPolicyPort_To_v1_NetworkPolicyPort(in *networking.NetworkPolicyPort, out *NetworkPolicyPort, s conversion.Scope) error {
|
||||||
|
out.Protocol = (*api_v1.Protocol)(unsafe.Pointer(in.Protocol))
|
||||||
|
out.Port = (*intstr.IntOrString)(unsafe.Pointer(in.Port))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_networking_NetworkPolicyPort_To_v1_NetworkPolicyPort is an autogenerated conversion function.
|
||||||
|
func Convert_networking_NetworkPolicyPort_To_v1_NetworkPolicyPort(in *networking.NetworkPolicyPort, out *NetworkPolicyPort, s conversion.Scope) error {
|
||||||
|
return autoConvert_networking_NetworkPolicyPort_To_v1_NetworkPolicyPort(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_v1_NetworkPolicySpec_To_networking_NetworkPolicySpec(in *NetworkPolicySpec, out *networking.NetworkPolicySpec, s conversion.Scope) error {
|
||||||
|
out.PodSelector = in.PodSelector
|
||||||
|
out.Ingress = *(*[]networking.NetworkPolicyIngressRule)(unsafe.Pointer(&in.Ingress))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_v1_NetworkPolicySpec_To_networking_NetworkPolicySpec is an autogenerated conversion function.
|
||||||
|
func Convert_v1_NetworkPolicySpec_To_networking_NetworkPolicySpec(in *NetworkPolicySpec, out *networking.NetworkPolicySpec, s conversion.Scope) error {
|
||||||
|
return autoConvert_v1_NetworkPolicySpec_To_networking_NetworkPolicySpec(in, out, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
func autoConvert_networking_NetworkPolicySpec_To_v1_NetworkPolicySpec(in *networking.NetworkPolicySpec, out *NetworkPolicySpec, s conversion.Scope) error {
|
||||||
|
out.PodSelector = in.PodSelector
|
||||||
|
out.Ingress = *(*[]NetworkPolicyIngressRule)(unsafe.Pointer(&in.Ingress))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Convert_networking_NetworkPolicySpec_To_v1_NetworkPolicySpec is an autogenerated conversion function.
|
||||||
|
func Convert_networking_NetworkPolicySpec_To_v1_NetworkPolicySpec(in *networking.NetworkPolicySpec, out *NetworkPolicySpec, s conversion.Scope) error {
|
||||||
|
return autoConvert_networking_NetworkPolicySpec_To_v1_NetworkPolicySpec(in, out, s)
|
||||||
|
}
|
182
pkg/apis/networking/v1/zz_generated.deepcopy.go
Normal file
182
pkg/apis/networking/v1/zz_generated.deepcopy.go
Normal file
@@ -0,0 +1,182 @@
|
|||||||
|
// +build !ignore_autogenerated
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This file was autogenerated by deepcopy-gen. Do not edit it manually!
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
import (
|
||||||
|
meta_v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
conversion "k8s.io/apimachinery/pkg/conversion"
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
intstr "k8s.io/apimachinery/pkg/util/intstr"
|
||||||
|
api_v1 "k8s.io/kubernetes/pkg/api/v1"
|
||||||
|
reflect "reflect"
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
SchemeBuilder.Register(RegisterDeepCopies)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RegisterDeepCopies adds deep-copy functions to the given scheme. Public
|
||||||
|
// to allow building arbitrary schemes.
|
||||||
|
func RegisterDeepCopies(scheme *runtime.Scheme) error {
|
||||||
|
return scheme.AddGeneratedDeepCopyFuncs(
|
||||||
|
conversion.GeneratedDeepCopyFunc{Fn: DeepCopy_v1_NetworkPolicy, InType: reflect.TypeOf(&NetworkPolicy{})},
|
||||||
|
conversion.GeneratedDeepCopyFunc{Fn: DeepCopy_v1_NetworkPolicyIngressRule, InType: reflect.TypeOf(&NetworkPolicyIngressRule{})},
|
||||||
|
conversion.GeneratedDeepCopyFunc{Fn: DeepCopy_v1_NetworkPolicyList, InType: reflect.TypeOf(&NetworkPolicyList{})},
|
||||||
|
conversion.GeneratedDeepCopyFunc{Fn: DeepCopy_v1_NetworkPolicyPeer, InType: reflect.TypeOf(&NetworkPolicyPeer{})},
|
||||||
|
conversion.GeneratedDeepCopyFunc{Fn: DeepCopy_v1_NetworkPolicyPort, InType: reflect.TypeOf(&NetworkPolicyPort{})},
|
||||||
|
conversion.GeneratedDeepCopyFunc{Fn: DeepCopy_v1_NetworkPolicySpec, InType: reflect.TypeOf(&NetworkPolicySpec{})},
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy_v1_NetworkPolicy is an autogenerated deepcopy function.
|
||||||
|
func DeepCopy_v1_NetworkPolicy(in interface{}, out interface{}, c *conversion.Cloner) error {
|
||||||
|
{
|
||||||
|
in := in.(*NetworkPolicy)
|
||||||
|
out := out.(*NetworkPolicy)
|
||||||
|
*out = *in
|
||||||
|
if newVal, err := c.DeepCopy(&in.ObjectMeta); err != nil {
|
||||||
|
return err
|
||||||
|
} else {
|
||||||
|
out.ObjectMeta = *newVal.(*meta_v1.ObjectMeta)
|
||||||
|
}
|
||||||
|
if err := DeepCopy_v1_NetworkPolicySpec(&in.Spec, &out.Spec, c); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy_v1_NetworkPolicyIngressRule is an autogenerated deepcopy function.
|
||||||
|
func DeepCopy_v1_NetworkPolicyIngressRule(in interface{}, out interface{}, c *conversion.Cloner) error {
|
||||||
|
{
|
||||||
|
in := in.(*NetworkPolicyIngressRule)
|
||||||
|
out := out.(*NetworkPolicyIngressRule)
|
||||||
|
*out = *in
|
||||||
|
if in.Ports != nil {
|
||||||
|
in, out := &in.Ports, &out.Ports
|
||||||
|
*out = make([]NetworkPolicyPort, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
if err := DeepCopy_v1_NetworkPolicyPort(&(*in)[i], &(*out)[i], c); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if in.From != nil {
|
||||||
|
in, out := &in.From, &out.From
|
||||||
|
*out = make([]NetworkPolicyPeer, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
if err := DeepCopy_v1_NetworkPolicyPeer(&(*in)[i], &(*out)[i], c); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy_v1_NetworkPolicyList is an autogenerated deepcopy function.
|
||||||
|
func DeepCopy_v1_NetworkPolicyList(in interface{}, out interface{}, c *conversion.Cloner) error {
|
||||||
|
{
|
||||||
|
in := in.(*NetworkPolicyList)
|
||||||
|
out := out.(*NetworkPolicyList)
|
||||||
|
*out = *in
|
||||||
|
if in.Items != nil {
|
||||||
|
in, out := &in.Items, &out.Items
|
||||||
|
*out = make([]NetworkPolicy, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
if err := DeepCopy_v1_NetworkPolicy(&(*in)[i], &(*out)[i], c); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy_v1_NetworkPolicyPeer is an autogenerated deepcopy function.
|
||||||
|
func DeepCopy_v1_NetworkPolicyPeer(in interface{}, out interface{}, c *conversion.Cloner) error {
|
||||||
|
{
|
||||||
|
in := in.(*NetworkPolicyPeer)
|
||||||
|
out := out.(*NetworkPolicyPeer)
|
||||||
|
*out = *in
|
||||||
|
if in.PodSelector != nil {
|
||||||
|
in, out := &in.PodSelector, &out.PodSelector
|
||||||
|
if newVal, err := c.DeepCopy(*in); err != nil {
|
||||||
|
return err
|
||||||
|
} else {
|
||||||
|
*out = newVal.(*meta_v1.LabelSelector)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if in.NamespaceSelector != nil {
|
||||||
|
in, out := &in.NamespaceSelector, &out.NamespaceSelector
|
||||||
|
if newVal, err := c.DeepCopy(*in); err != nil {
|
||||||
|
return err
|
||||||
|
} else {
|
||||||
|
*out = newVal.(*meta_v1.LabelSelector)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy_v1_NetworkPolicyPort is an autogenerated deepcopy function.
|
||||||
|
func DeepCopy_v1_NetworkPolicyPort(in interface{}, out interface{}, c *conversion.Cloner) error {
|
||||||
|
{
|
||||||
|
in := in.(*NetworkPolicyPort)
|
||||||
|
out := out.(*NetworkPolicyPort)
|
||||||
|
*out = *in
|
||||||
|
if in.Protocol != nil {
|
||||||
|
in, out := &in.Protocol, &out.Protocol
|
||||||
|
*out = new(api_v1.Protocol)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
if in.Port != nil {
|
||||||
|
in, out := &in.Port, &out.Port
|
||||||
|
*out = new(intstr.IntOrString)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy_v1_NetworkPolicySpec is an autogenerated deepcopy function.
|
||||||
|
func DeepCopy_v1_NetworkPolicySpec(in interface{}, out interface{}, c *conversion.Cloner) error {
|
||||||
|
{
|
||||||
|
in := in.(*NetworkPolicySpec)
|
||||||
|
out := out.(*NetworkPolicySpec)
|
||||||
|
*out = *in
|
||||||
|
if newVal, err := c.DeepCopy(&in.PodSelector); err != nil {
|
||||||
|
return err
|
||||||
|
} else {
|
||||||
|
out.PodSelector = *newVal.(*meta_v1.LabelSelector)
|
||||||
|
}
|
||||||
|
if in.Ingress != nil {
|
||||||
|
in, out := &in.Ingress, &out.Ingress
|
||||||
|
*out = make([]NetworkPolicyIngressRule, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
if err := DeepCopy_v1_NetworkPolicyIngressRule(&(*in)[i], &(*out)[i], c); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
51
pkg/apis/networking/v1/zz_generated.defaults.go
Normal file
51
pkg/apis/networking/v1/zz_generated.defaults.go
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
// +build !ignore_autogenerated
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This file was autogenerated by defaulter-gen. Do not edit it manually!
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
import (
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
)
|
||||||
|
|
||||||
|
// RegisterDefaults adds defaulters functions to the given scheme.
|
||||||
|
// Public to allow building arbitrary schemes.
|
||||||
|
// All generated defaulters are covering - they call all nested defaulters.
|
||||||
|
func RegisterDefaults(scheme *runtime.Scheme) error {
|
||||||
|
scheme.AddTypeDefaultingFunc(&NetworkPolicy{}, func(obj interface{}) { SetObjectDefaults_NetworkPolicy(obj.(*NetworkPolicy)) })
|
||||||
|
scheme.AddTypeDefaultingFunc(&NetworkPolicyList{}, func(obj interface{}) { SetObjectDefaults_NetworkPolicyList(obj.(*NetworkPolicyList)) })
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func SetObjectDefaults_NetworkPolicy(in *NetworkPolicy) {
|
||||||
|
for i := range in.Spec.Ingress {
|
||||||
|
a := &in.Spec.Ingress[i]
|
||||||
|
for j := range a.Ports {
|
||||||
|
b := &a.Ports[j]
|
||||||
|
SetDefaults_NetworkPolicyPort(b)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func SetObjectDefaults_NetworkPolicyList(in *NetworkPolicyList) {
|
||||||
|
for i := range in.Items {
|
||||||
|
a := &in.Items[i]
|
||||||
|
SetObjectDefaults_NetworkPolicy(a)
|
||||||
|
}
|
||||||
|
}
|
50
pkg/apis/networking/validation/BUILD
Normal file
50
pkg/apis/networking/validation/BUILD
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
"go_test",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_test(
|
||||||
|
name = "go_default_test",
|
||||||
|
srcs = ["validation_test.go"],
|
||||||
|
library = ":go_default_library",
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/api:go_default_library",
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/util/intstr:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = ["validation.go"],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/api:go_default_library",
|
||||||
|
"//pkg/api/validation:go_default_library",
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1/validation:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/util/intstr:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/util/validation:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/util/validation/field:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [":package-srcs"],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
99
pkg/apis/networking/validation/validation.go
Normal file
99
pkg/apis/networking/validation/validation.go
Normal file
@@ -0,0 +1,99 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package validation
|
||||||
|
|
||||||
|
import (
|
||||||
|
"reflect"
|
||||||
|
|
||||||
|
unversionedvalidation "k8s.io/apimachinery/pkg/apis/meta/v1/validation"
|
||||||
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
|
"k8s.io/apimachinery/pkg/util/validation"
|
||||||
|
"k8s.io/apimachinery/pkg/util/validation/field"
|
||||||
|
"k8s.io/kubernetes/pkg/api"
|
||||||
|
apivalidation "k8s.io/kubernetes/pkg/api/validation"
|
||||||
|
"k8s.io/kubernetes/pkg/apis/networking"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ValidateNetworkPolicyName can be used to check whether the given networkpolicy
|
||||||
|
// name is valid.
|
||||||
|
func ValidateNetworkPolicyName(name string, prefix bool) []string {
|
||||||
|
return apivalidation.NameIsDNSSubdomain(name, prefix)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ValidateNetworkPolicySpec tests if required fields in the networkpolicy spec are set.
|
||||||
|
func ValidateNetworkPolicySpec(spec *networking.NetworkPolicySpec, fldPath *field.Path) field.ErrorList {
|
||||||
|
allErrs := field.ErrorList{}
|
||||||
|
allErrs = append(allErrs, unversionedvalidation.ValidateLabelSelector(&spec.PodSelector, fldPath.Child("podSelector"))...)
|
||||||
|
|
||||||
|
// Validate ingress rules.
|
||||||
|
for i, ingress := range spec.Ingress {
|
||||||
|
ingressPath := fldPath.Child("ingress").Index(i)
|
||||||
|
for i, port := range ingress.Ports {
|
||||||
|
portPath := ingressPath.Child("ports").Index(i)
|
||||||
|
if port.Protocol != nil && *port.Protocol != api.ProtocolTCP && *port.Protocol != api.ProtocolUDP {
|
||||||
|
allErrs = append(allErrs, field.NotSupported(portPath.Child("protocol"), *port.Protocol, []string{string(api.ProtocolTCP), string(api.ProtocolUDP)}))
|
||||||
|
}
|
||||||
|
if port.Port != nil {
|
||||||
|
if port.Port.Type == intstr.Int {
|
||||||
|
for _, msg := range validation.IsValidPortNum(int(port.Port.IntVal)) {
|
||||||
|
allErrs = append(allErrs, field.Invalid(portPath.Child("port"), port.Port.IntVal, msg))
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
for _, msg := range validation.IsValidPortName(port.Port.StrVal) {
|
||||||
|
allErrs = append(allErrs, field.Invalid(portPath.Child("port"), port.Port.StrVal, msg))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for i, from := range ingress.From {
|
||||||
|
fromPath := ingressPath.Child("from").Index(i)
|
||||||
|
numFroms := 0
|
||||||
|
if from.PodSelector != nil {
|
||||||
|
numFroms++
|
||||||
|
allErrs = append(allErrs, unversionedvalidation.ValidateLabelSelector(from.PodSelector, fromPath.Child("podSelector"))...)
|
||||||
|
}
|
||||||
|
if from.NamespaceSelector != nil {
|
||||||
|
numFroms++
|
||||||
|
allErrs = append(allErrs, unversionedvalidation.ValidateLabelSelector(from.NamespaceSelector, fromPath.Child("namespaceSelector"))...)
|
||||||
|
}
|
||||||
|
|
||||||
|
if numFroms == 0 {
|
||||||
|
allErrs = append(allErrs, field.Required(fromPath, "must specify a from type"))
|
||||||
|
} else if numFroms > 1 {
|
||||||
|
allErrs = append(allErrs, field.Forbidden(fromPath, "may not specify more than 1 from type"))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return allErrs
|
||||||
|
}
|
||||||
|
|
||||||
|
// ValidateNetworkPolicy validates a networkpolicy.
|
||||||
|
func ValidateNetworkPolicy(np *networking.NetworkPolicy) field.ErrorList {
|
||||||
|
allErrs := apivalidation.ValidateObjectMeta(&np.ObjectMeta, true, ValidateNetworkPolicyName, field.NewPath("metadata"))
|
||||||
|
allErrs = append(allErrs, ValidateNetworkPolicySpec(&np.Spec, field.NewPath("spec"))...)
|
||||||
|
return allErrs
|
||||||
|
}
|
||||||
|
|
||||||
|
// ValidateNetworkPolicyUpdate tests if an update to a NetworkPolicy is valid.
|
||||||
|
func ValidateNetworkPolicyUpdate(update, old *networking.NetworkPolicy) field.ErrorList {
|
||||||
|
allErrs := field.ErrorList{}
|
||||||
|
allErrs = append(allErrs, apivalidation.ValidateObjectMetaUpdate(&update.ObjectMeta, &old.ObjectMeta, field.NewPath("metadata"))...)
|
||||||
|
if !reflect.DeepEqual(update.Spec, old.Spec) {
|
||||||
|
allErrs = append(allErrs, field.Forbidden(field.NewPath("spec"), "updates to networkpolicy spec are forbidden."))
|
||||||
|
}
|
||||||
|
return allErrs
|
||||||
|
}
|
346
pkg/apis/networking/validation/validation_test.go
Normal file
346
pkg/apis/networking/validation/validation_test.go
Normal file
@@ -0,0 +1,346 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2014 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package validation
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
|
"k8s.io/kubernetes/pkg/api"
|
||||||
|
"k8s.io/kubernetes/pkg/apis/networking"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestValidateNetworkPolicy(t *testing.T) {
|
||||||
|
protocolTCP := api.ProtocolTCP
|
||||||
|
protocolUDP := api.ProtocolUDP
|
||||||
|
protocolICMP := api.Protocol("ICMP")
|
||||||
|
|
||||||
|
successCases := []networking.NetworkPolicy{
|
||||||
|
{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"a": "b"},
|
||||||
|
},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"a": "b"},
|
||||||
|
},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{
|
||||||
|
{
|
||||||
|
From: []networking.NetworkPolicyPeer{},
|
||||||
|
Ports: []networking.NetworkPolicyPort{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"a": "b"},
|
||||||
|
},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{
|
||||||
|
{
|
||||||
|
Ports: []networking.NetworkPolicyPort{
|
||||||
|
{
|
||||||
|
Protocol: nil,
|
||||||
|
Port: &intstr.IntOrString{Type: intstr.Int, IntVal: 80},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Protocol: &protocolTCP,
|
||||||
|
Port: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Protocol: &protocolTCP,
|
||||||
|
Port: &intstr.IntOrString{Type: intstr.Int, IntVal: 443},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Protocol: &protocolUDP,
|
||||||
|
Port: &intstr.IntOrString{Type: intstr.String, StrVal: "dns"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"a": "b"},
|
||||||
|
},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{
|
||||||
|
{
|
||||||
|
From: []networking.NetworkPolicyPeer{
|
||||||
|
{
|
||||||
|
PodSelector: &metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"c": "d"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"a": "b"},
|
||||||
|
},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{
|
||||||
|
{
|
||||||
|
From: []networking.NetworkPolicyPeer{
|
||||||
|
{
|
||||||
|
NamespaceSelector: &metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"c": "d"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
// Success cases are expected to pass validation.
|
||||||
|
for k, v := range successCases {
|
||||||
|
if errs := ValidateNetworkPolicy(&v); len(errs) != 0 {
|
||||||
|
t.Errorf("Expected success for %d, got %v", k, errs)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
invalidSelector := map[string]string{"NoUppercaseOrSpecialCharsLike=Equals": "b"}
|
||||||
|
errorCases := map[string]networking.NetworkPolicy{
|
||||||
|
"namespaceSelector and podSelector": {
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"a": "b"},
|
||||||
|
},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{
|
||||||
|
{
|
||||||
|
From: []networking.NetworkPolicyPeer{
|
||||||
|
{
|
||||||
|
PodSelector: &metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"c": "d"},
|
||||||
|
},
|
||||||
|
NamespaceSelector: &metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"c": "d"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"invalid spec.podSelector": {
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{
|
||||||
|
MatchLabels: invalidSelector,
|
||||||
|
},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{
|
||||||
|
{
|
||||||
|
From: []networking.NetworkPolicyPeer{
|
||||||
|
{
|
||||||
|
NamespaceSelector: &metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"c": "d"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"invalid ingress.ports.protocol": {
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{
|
||||||
|
{
|
||||||
|
Ports: []networking.NetworkPolicyPort{
|
||||||
|
{
|
||||||
|
Protocol: &protocolICMP,
|
||||||
|
Port: &intstr.IntOrString{Type: intstr.Int, IntVal: 80},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"invalid ingress.ports.port (int)": {
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{
|
||||||
|
{
|
||||||
|
Ports: []networking.NetworkPolicyPort{
|
||||||
|
{
|
||||||
|
Protocol: &protocolTCP,
|
||||||
|
Port: &intstr.IntOrString{Type: intstr.Int, IntVal: 123456789},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"invalid ingress.ports.port (str)": {
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{
|
||||||
|
{
|
||||||
|
Ports: []networking.NetworkPolicyPort{
|
||||||
|
{
|
||||||
|
Protocol: &protocolTCP,
|
||||||
|
Port: &intstr.IntOrString{Type: intstr.String, StrVal: "!@#$"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"invalid ingress.from.podSelector": {
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{
|
||||||
|
{
|
||||||
|
From: []networking.NetworkPolicyPeer{
|
||||||
|
{
|
||||||
|
PodSelector: &metav1.LabelSelector{
|
||||||
|
MatchLabels: invalidSelector,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"invalid ingress.from.namespaceSelector": {
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{
|
||||||
|
{
|
||||||
|
From: []networking.NetworkPolicyPeer{
|
||||||
|
{
|
||||||
|
NamespaceSelector: &metav1.LabelSelector{
|
||||||
|
MatchLabels: invalidSelector,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
// Error cases are not expected to pass validation.
|
||||||
|
for testName, networkPolicy := range errorCases {
|
||||||
|
if errs := ValidateNetworkPolicy(&networkPolicy); len(errs) == 0 {
|
||||||
|
t.Errorf("Expected failure for test: %s", testName)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestValidateNetworkPolicyUpdate(t *testing.T) {
|
||||||
|
type npUpdateTest struct {
|
||||||
|
old networking.NetworkPolicy
|
||||||
|
update networking.NetworkPolicy
|
||||||
|
}
|
||||||
|
successCases := []npUpdateTest{
|
||||||
|
{
|
||||||
|
old: networking.NetworkPolicy{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"a": "b"},
|
||||||
|
},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
update: networking.NetworkPolicy{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"a": "b"},
|
||||||
|
},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, successCase := range successCases {
|
||||||
|
successCase.old.ObjectMeta.ResourceVersion = "1"
|
||||||
|
successCase.update.ObjectMeta.ResourceVersion = "1"
|
||||||
|
if errs := ValidateNetworkPolicyUpdate(&successCase.update, &successCase.old); len(errs) != 0 {
|
||||||
|
t.Errorf("expected success: %v", errs)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
errorCases := map[string]npUpdateTest{
|
||||||
|
"change name": {
|
||||||
|
old: networking.NetworkPolicy{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
update: networking.NetworkPolicy{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "baz", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"change spec": {
|
||||||
|
old: networking.NetworkPolicy{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
update: networking.NetworkPolicy{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{Name: "foo", Namespace: "bar"},
|
||||||
|
Spec: networking.NetworkPolicySpec{
|
||||||
|
PodSelector: metav1.LabelSelector{
|
||||||
|
MatchLabels: map[string]string{"a": "b"},
|
||||||
|
},
|
||||||
|
Ingress: []networking.NetworkPolicyIngressRule{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for testName, errorCase := range errorCases {
|
||||||
|
if errs := ValidateNetworkPolicyUpdate(&errorCase.update, &errorCase.old); len(errs) == 0 {
|
||||||
|
t.Errorf("expected failure: %s", testName)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
182
pkg/apis/networking/zz_generated.deepcopy.go
Normal file
182
pkg/apis/networking/zz_generated.deepcopy.go
Normal file
@@ -0,0 +1,182 @@
|
|||||||
|
// +build !ignore_autogenerated
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This file was autogenerated by deepcopy-gen. Do not edit it manually!
|
||||||
|
|
||||||
|
package networking
|
||||||
|
|
||||||
|
import (
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
conversion "k8s.io/apimachinery/pkg/conversion"
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
intstr "k8s.io/apimachinery/pkg/util/intstr"
|
||||||
|
api "k8s.io/kubernetes/pkg/api"
|
||||||
|
reflect "reflect"
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
SchemeBuilder.Register(RegisterDeepCopies)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RegisterDeepCopies adds deep-copy functions to the given scheme. Public
|
||||||
|
// to allow building arbitrary schemes.
|
||||||
|
func RegisterDeepCopies(scheme *runtime.Scheme) error {
|
||||||
|
return scheme.AddGeneratedDeepCopyFuncs(
|
||||||
|
conversion.GeneratedDeepCopyFunc{Fn: DeepCopy_networking_NetworkPolicy, InType: reflect.TypeOf(&NetworkPolicy{})},
|
||||||
|
conversion.GeneratedDeepCopyFunc{Fn: DeepCopy_networking_NetworkPolicyIngressRule, InType: reflect.TypeOf(&NetworkPolicyIngressRule{})},
|
||||||
|
conversion.GeneratedDeepCopyFunc{Fn: DeepCopy_networking_NetworkPolicyList, InType: reflect.TypeOf(&NetworkPolicyList{})},
|
||||||
|
conversion.GeneratedDeepCopyFunc{Fn: DeepCopy_networking_NetworkPolicyPeer, InType: reflect.TypeOf(&NetworkPolicyPeer{})},
|
||||||
|
conversion.GeneratedDeepCopyFunc{Fn: DeepCopy_networking_NetworkPolicyPort, InType: reflect.TypeOf(&NetworkPolicyPort{})},
|
||||||
|
conversion.GeneratedDeepCopyFunc{Fn: DeepCopy_networking_NetworkPolicySpec, InType: reflect.TypeOf(&NetworkPolicySpec{})},
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy_networking_NetworkPolicy is an autogenerated deepcopy function.
|
||||||
|
func DeepCopy_networking_NetworkPolicy(in interface{}, out interface{}, c *conversion.Cloner) error {
|
||||||
|
{
|
||||||
|
in := in.(*NetworkPolicy)
|
||||||
|
out := out.(*NetworkPolicy)
|
||||||
|
*out = *in
|
||||||
|
if newVal, err := c.DeepCopy(&in.ObjectMeta); err != nil {
|
||||||
|
return err
|
||||||
|
} else {
|
||||||
|
out.ObjectMeta = *newVal.(*v1.ObjectMeta)
|
||||||
|
}
|
||||||
|
if err := DeepCopy_networking_NetworkPolicySpec(&in.Spec, &out.Spec, c); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy_networking_NetworkPolicyIngressRule is an autogenerated deepcopy function.
|
||||||
|
func DeepCopy_networking_NetworkPolicyIngressRule(in interface{}, out interface{}, c *conversion.Cloner) error {
|
||||||
|
{
|
||||||
|
in := in.(*NetworkPolicyIngressRule)
|
||||||
|
out := out.(*NetworkPolicyIngressRule)
|
||||||
|
*out = *in
|
||||||
|
if in.Ports != nil {
|
||||||
|
in, out := &in.Ports, &out.Ports
|
||||||
|
*out = make([]NetworkPolicyPort, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
if err := DeepCopy_networking_NetworkPolicyPort(&(*in)[i], &(*out)[i], c); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if in.From != nil {
|
||||||
|
in, out := &in.From, &out.From
|
||||||
|
*out = make([]NetworkPolicyPeer, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
if err := DeepCopy_networking_NetworkPolicyPeer(&(*in)[i], &(*out)[i], c); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy_networking_NetworkPolicyList is an autogenerated deepcopy function.
|
||||||
|
func DeepCopy_networking_NetworkPolicyList(in interface{}, out interface{}, c *conversion.Cloner) error {
|
||||||
|
{
|
||||||
|
in := in.(*NetworkPolicyList)
|
||||||
|
out := out.(*NetworkPolicyList)
|
||||||
|
*out = *in
|
||||||
|
if in.Items != nil {
|
||||||
|
in, out := &in.Items, &out.Items
|
||||||
|
*out = make([]NetworkPolicy, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
if err := DeepCopy_networking_NetworkPolicy(&(*in)[i], &(*out)[i], c); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy_networking_NetworkPolicyPeer is an autogenerated deepcopy function.
|
||||||
|
func DeepCopy_networking_NetworkPolicyPeer(in interface{}, out interface{}, c *conversion.Cloner) error {
|
||||||
|
{
|
||||||
|
in := in.(*NetworkPolicyPeer)
|
||||||
|
out := out.(*NetworkPolicyPeer)
|
||||||
|
*out = *in
|
||||||
|
if in.PodSelector != nil {
|
||||||
|
in, out := &in.PodSelector, &out.PodSelector
|
||||||
|
if newVal, err := c.DeepCopy(*in); err != nil {
|
||||||
|
return err
|
||||||
|
} else {
|
||||||
|
*out = newVal.(*v1.LabelSelector)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if in.NamespaceSelector != nil {
|
||||||
|
in, out := &in.NamespaceSelector, &out.NamespaceSelector
|
||||||
|
if newVal, err := c.DeepCopy(*in); err != nil {
|
||||||
|
return err
|
||||||
|
} else {
|
||||||
|
*out = newVal.(*v1.LabelSelector)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy_networking_NetworkPolicyPort is an autogenerated deepcopy function.
|
||||||
|
func DeepCopy_networking_NetworkPolicyPort(in interface{}, out interface{}, c *conversion.Cloner) error {
|
||||||
|
{
|
||||||
|
in := in.(*NetworkPolicyPort)
|
||||||
|
out := out.(*NetworkPolicyPort)
|
||||||
|
*out = *in
|
||||||
|
if in.Protocol != nil {
|
||||||
|
in, out := &in.Protocol, &out.Protocol
|
||||||
|
*out = new(api.Protocol)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
if in.Port != nil {
|
||||||
|
in, out := &in.Port, &out.Port
|
||||||
|
*out = new(intstr.IntOrString)
|
||||||
|
**out = **in
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeepCopy_networking_NetworkPolicySpec is an autogenerated deepcopy function.
|
||||||
|
func DeepCopy_networking_NetworkPolicySpec(in interface{}, out interface{}, c *conversion.Cloner) error {
|
||||||
|
{
|
||||||
|
in := in.(*NetworkPolicySpec)
|
||||||
|
out := out.(*NetworkPolicySpec)
|
||||||
|
*out = *in
|
||||||
|
if newVal, err := c.DeepCopy(&in.PodSelector); err != nil {
|
||||||
|
return err
|
||||||
|
} else {
|
||||||
|
out.PodSelector = *newVal.(*v1.LabelSelector)
|
||||||
|
}
|
||||||
|
if in.Ingress != nil {
|
||||||
|
in, out := &in.Ingress, &out.Ingress
|
||||||
|
*out = make([]NetworkPolicyIngressRule, len(*in))
|
||||||
|
for i := range *in {
|
||||||
|
if err := DeepCopy_networking_NetworkPolicyIngressRule(&(*in)[i], &(*out)[i], c); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
@@ -42,6 +42,7 @@ go_library(
|
|||||||
"//pkg/client/clientset_generated/clientset/typed/certificates/v1beta1:go_default_library",
|
"//pkg/client/clientset_generated/clientset/typed/certificates/v1beta1:go_default_library",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/core/v1:go_default_library",
|
"//pkg/client/clientset_generated/clientset/typed/core/v1:go_default_library",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/extensions/v1beta1:go_default_library",
|
"//pkg/client/clientset_generated/clientset/typed/extensions/v1beta1:go_default_library",
|
||||||
|
"//pkg/client/clientset_generated/clientset/typed/networking/v1:go_default_library",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/policy/v1beta1:go_default_library",
|
"//pkg/client/clientset_generated/clientset/typed/policy/v1beta1:go_default_library",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/rbac/v1alpha1:go_default_library",
|
"//pkg/client/clientset_generated/clientset/typed/rbac/v1alpha1:go_default_library",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/rbac/v1beta1:go_default_library",
|
"//pkg/client/clientset_generated/clientset/typed/rbac/v1beta1:go_default_library",
|
||||||
@@ -81,6 +82,7 @@ filegroup(
|
|||||||
"//pkg/client/clientset_generated/clientset/typed/certificates/v1beta1:all-srcs",
|
"//pkg/client/clientset_generated/clientset/typed/certificates/v1beta1:all-srcs",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/core/v1:all-srcs",
|
"//pkg/client/clientset_generated/clientset/typed/core/v1:all-srcs",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/extensions/v1beta1:all-srcs",
|
"//pkg/client/clientset_generated/clientset/typed/extensions/v1beta1:all-srcs",
|
||||||
|
"//pkg/client/clientset_generated/clientset/typed/networking/v1:all-srcs",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/policy/v1beta1:all-srcs",
|
"//pkg/client/clientset_generated/clientset/typed/policy/v1beta1:all-srcs",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/rbac/v1alpha1:all-srcs",
|
"//pkg/client/clientset_generated/clientset/typed/rbac/v1alpha1:all-srcs",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/rbac/v1beta1:all-srcs",
|
"//pkg/client/clientset_generated/clientset/typed/rbac/v1beta1:all-srcs",
|
||||||
|
@@ -34,6 +34,7 @@ import (
|
|||||||
certificatesv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/certificates/v1beta1"
|
certificatesv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/certificates/v1beta1"
|
||||||
corev1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/core/v1"
|
corev1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/core/v1"
|
||||||
extensionsv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/extensions/v1beta1"
|
extensionsv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/extensions/v1beta1"
|
||||||
|
networkingv1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/networking/v1"
|
||||||
policyv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/policy/v1beta1"
|
policyv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/policy/v1beta1"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/rbac/v1alpha1"
|
||||||
rbacv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/rbac/v1beta1"
|
rbacv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/rbac/v1beta1"
|
||||||
@@ -75,6 +76,9 @@ type Interface interface {
|
|||||||
ExtensionsV1beta1() extensionsv1beta1.ExtensionsV1beta1Interface
|
ExtensionsV1beta1() extensionsv1beta1.ExtensionsV1beta1Interface
|
||||||
// Deprecated: please explicitly pick a version if possible.
|
// Deprecated: please explicitly pick a version if possible.
|
||||||
Extensions() extensionsv1beta1.ExtensionsV1beta1Interface
|
Extensions() extensionsv1beta1.ExtensionsV1beta1Interface
|
||||||
|
NetworkingV1() networkingv1.NetworkingV1Interface
|
||||||
|
// Deprecated: please explicitly pick a version if possible.
|
||||||
|
Networking() networkingv1.NetworkingV1Interface
|
||||||
PolicyV1beta1() policyv1beta1.PolicyV1beta1Interface
|
PolicyV1beta1() policyv1beta1.PolicyV1beta1Interface
|
||||||
// Deprecated: please explicitly pick a version if possible.
|
// Deprecated: please explicitly pick a version if possible.
|
||||||
Policy() policyv1beta1.PolicyV1beta1Interface
|
Policy() policyv1beta1.PolicyV1beta1Interface
|
||||||
@@ -108,6 +112,7 @@ type Clientset struct {
|
|||||||
*batchv2alpha1.BatchV2alpha1Client
|
*batchv2alpha1.BatchV2alpha1Client
|
||||||
*certificatesv1beta1.CertificatesV1beta1Client
|
*certificatesv1beta1.CertificatesV1beta1Client
|
||||||
*extensionsv1beta1.ExtensionsV1beta1Client
|
*extensionsv1beta1.ExtensionsV1beta1Client
|
||||||
|
*networkingv1.NetworkingV1Client
|
||||||
*policyv1beta1.PolicyV1beta1Client
|
*policyv1beta1.PolicyV1beta1Client
|
||||||
*rbacv1beta1.RbacV1beta1Client
|
*rbacv1beta1.RbacV1beta1Client
|
||||||
*rbacv1alpha1.RbacV1alpha1Client
|
*rbacv1alpha1.RbacV1alpha1Client
|
||||||
@@ -301,6 +306,23 @@ func (c *Clientset) Extensions() extensionsv1beta1.ExtensionsV1beta1Interface {
|
|||||||
return c.ExtensionsV1beta1Client
|
return c.ExtensionsV1beta1Client
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NetworkingV1 retrieves the NetworkingV1Client
|
||||||
|
func (c *Clientset) NetworkingV1() networkingv1.NetworkingV1Interface {
|
||||||
|
if c == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return c.NetworkingV1Client
|
||||||
|
}
|
||||||
|
|
||||||
|
// Deprecated: Networking retrieves the default version of NetworkingClient.
|
||||||
|
// Please explicitly pick a version.
|
||||||
|
func (c *Clientset) Networking() networkingv1.NetworkingV1Interface {
|
||||||
|
if c == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return c.NetworkingV1Client
|
||||||
|
}
|
||||||
|
|
||||||
// PolicyV1beta1 retrieves the PolicyV1beta1Client
|
// PolicyV1beta1 retrieves the PolicyV1beta1Client
|
||||||
func (c *Clientset) PolicyV1beta1() policyv1beta1.PolicyV1beta1Interface {
|
func (c *Clientset) PolicyV1beta1() policyv1beta1.PolicyV1beta1Interface {
|
||||||
if c == nil {
|
if c == nil {
|
||||||
@@ -453,6 +475,10 @@ func NewForConfig(c *rest.Config) (*Clientset, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
cs.NetworkingV1Client, err = networkingv1.NewForConfig(&configShallowCopy)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
cs.PolicyV1beta1Client, err = policyv1beta1.NewForConfig(&configShallowCopy)
|
cs.PolicyV1beta1Client, err = policyv1beta1.NewForConfig(&configShallowCopy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@@ -503,6 +529,7 @@ func NewForConfigOrDie(c *rest.Config) *Clientset {
|
|||||||
cs.BatchV2alpha1Client = batchv2alpha1.NewForConfigOrDie(c)
|
cs.BatchV2alpha1Client = batchv2alpha1.NewForConfigOrDie(c)
|
||||||
cs.CertificatesV1beta1Client = certificatesv1beta1.NewForConfigOrDie(c)
|
cs.CertificatesV1beta1Client = certificatesv1beta1.NewForConfigOrDie(c)
|
||||||
cs.ExtensionsV1beta1Client = extensionsv1beta1.NewForConfigOrDie(c)
|
cs.ExtensionsV1beta1Client = extensionsv1beta1.NewForConfigOrDie(c)
|
||||||
|
cs.NetworkingV1Client = networkingv1.NewForConfigOrDie(c)
|
||||||
cs.PolicyV1beta1Client = policyv1beta1.NewForConfigOrDie(c)
|
cs.PolicyV1beta1Client = policyv1beta1.NewForConfigOrDie(c)
|
||||||
cs.RbacV1beta1Client = rbacv1beta1.NewForConfigOrDie(c)
|
cs.RbacV1beta1Client = rbacv1beta1.NewForConfigOrDie(c)
|
||||||
cs.RbacV1alpha1Client = rbacv1alpha1.NewForConfigOrDie(c)
|
cs.RbacV1alpha1Client = rbacv1alpha1.NewForConfigOrDie(c)
|
||||||
@@ -530,6 +557,7 @@ func New(c rest.Interface) *Clientset {
|
|||||||
cs.BatchV2alpha1Client = batchv2alpha1.New(c)
|
cs.BatchV2alpha1Client = batchv2alpha1.New(c)
|
||||||
cs.CertificatesV1beta1Client = certificatesv1beta1.New(c)
|
cs.CertificatesV1beta1Client = certificatesv1beta1.New(c)
|
||||||
cs.ExtensionsV1beta1Client = extensionsv1beta1.New(c)
|
cs.ExtensionsV1beta1Client = extensionsv1beta1.New(c)
|
||||||
|
cs.NetworkingV1Client = networkingv1.New(c)
|
||||||
cs.PolicyV1beta1Client = policyv1beta1.New(c)
|
cs.PolicyV1beta1Client = policyv1beta1.New(c)
|
||||||
cs.RbacV1beta1Client = rbacv1beta1.New(c)
|
cs.RbacV1beta1Client = rbacv1beta1.New(c)
|
||||||
cs.RbacV1alpha1Client = rbacv1alpha1.New(c)
|
cs.RbacV1alpha1Client = rbacv1alpha1.New(c)
|
||||||
|
@@ -29,6 +29,7 @@ go_library(
|
|||||||
"//pkg/apis/batch/v2alpha1:go_default_library",
|
"//pkg/apis/batch/v2alpha1:go_default_library",
|
||||||
"//pkg/apis/certificates/v1beta1:go_default_library",
|
"//pkg/apis/certificates/v1beta1:go_default_library",
|
||||||
"//pkg/apis/extensions/v1beta1:go_default_library",
|
"//pkg/apis/extensions/v1beta1:go_default_library",
|
||||||
|
"//pkg/apis/networking/v1:go_default_library",
|
||||||
"//pkg/apis/policy/v1beta1:go_default_library",
|
"//pkg/apis/policy/v1beta1:go_default_library",
|
||||||
"//pkg/apis/rbac/v1alpha1:go_default_library",
|
"//pkg/apis/rbac/v1alpha1:go_default_library",
|
||||||
"//pkg/apis/rbac/v1beta1:go_default_library",
|
"//pkg/apis/rbac/v1beta1:go_default_library",
|
||||||
@@ -62,6 +63,8 @@ go_library(
|
|||||||
"//pkg/client/clientset_generated/clientset/typed/core/v1/fake:go_default_library",
|
"//pkg/client/clientset_generated/clientset/typed/core/v1/fake:go_default_library",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/extensions/v1beta1:go_default_library",
|
"//pkg/client/clientset_generated/clientset/typed/extensions/v1beta1:go_default_library",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/extensions/v1beta1/fake:go_default_library",
|
"//pkg/client/clientset_generated/clientset/typed/extensions/v1beta1/fake:go_default_library",
|
||||||
|
"//pkg/client/clientset_generated/clientset/typed/networking/v1:go_default_library",
|
||||||
|
"//pkg/client/clientset_generated/clientset/typed/networking/v1/fake:go_default_library",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/policy/v1beta1:go_default_library",
|
"//pkg/client/clientset_generated/clientset/typed/policy/v1beta1:go_default_library",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/policy/v1beta1/fake:go_default_library",
|
"//pkg/client/clientset_generated/clientset/typed/policy/v1beta1/fake:go_default_library",
|
||||||
"//pkg/client/clientset_generated/clientset/typed/rbac/v1alpha1:go_default_library",
|
"//pkg/client/clientset_generated/clientset/typed/rbac/v1alpha1:go_default_library",
|
||||||
|
@@ -49,6 +49,8 @@ import (
|
|||||||
fakecorev1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/core/v1/fake"
|
fakecorev1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/core/v1/fake"
|
||||||
extensionsv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/extensions/v1beta1"
|
extensionsv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/extensions/v1beta1"
|
||||||
fakeextensionsv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/extensions/v1beta1/fake"
|
fakeextensionsv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/extensions/v1beta1/fake"
|
||||||
|
networkingv1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/networking/v1"
|
||||||
|
fakenetworkingv1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/networking/v1/fake"
|
||||||
policyv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/policy/v1beta1"
|
policyv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/policy/v1beta1"
|
||||||
fakepolicyv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/policy/v1beta1/fake"
|
fakepolicyv1beta1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/policy/v1beta1/fake"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/rbac/v1alpha1"
|
||||||
@@ -206,6 +208,16 @@ func (c *Clientset) Extensions() extensionsv1beta1.ExtensionsV1beta1Interface {
|
|||||||
return &fakeextensionsv1beta1.FakeExtensionsV1beta1{Fake: &c.Fake}
|
return &fakeextensionsv1beta1.FakeExtensionsV1beta1{Fake: &c.Fake}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NetworkingV1 retrieves the NetworkingV1Client
|
||||||
|
func (c *Clientset) NetworkingV1() networkingv1.NetworkingV1Interface {
|
||||||
|
return &fakenetworkingv1.FakeNetworkingV1{Fake: &c.Fake}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Networking retrieves the NetworkingV1Client
|
||||||
|
func (c *Clientset) Networking() networkingv1.NetworkingV1Interface {
|
||||||
|
return &fakenetworkingv1.FakeNetworkingV1{Fake: &c.Fake}
|
||||||
|
}
|
||||||
|
|
||||||
// PolicyV1beta1 retrieves the PolicyV1beta1Client
|
// PolicyV1beta1 retrieves the PolicyV1beta1Client
|
||||||
func (c *Clientset) PolicyV1beta1() policyv1beta1.PolicyV1beta1Interface {
|
func (c *Clientset) PolicyV1beta1() policyv1beta1.PolicyV1beta1Interface {
|
||||||
return &fakepolicyv1beta1.FakePolicyV1beta1{Fake: &c.Fake}
|
return &fakepolicyv1beta1.FakePolicyV1beta1{Fake: &c.Fake}
|
||||||
|
@@ -34,6 +34,7 @@ import (
|
|||||||
batchv2alpha1 "k8s.io/kubernetes/pkg/apis/batch/v2alpha1"
|
batchv2alpha1 "k8s.io/kubernetes/pkg/apis/batch/v2alpha1"
|
||||||
certificatesv1beta1 "k8s.io/kubernetes/pkg/apis/certificates/v1beta1"
|
certificatesv1beta1 "k8s.io/kubernetes/pkg/apis/certificates/v1beta1"
|
||||||
extensionsv1beta1 "k8s.io/kubernetes/pkg/apis/extensions/v1beta1"
|
extensionsv1beta1 "k8s.io/kubernetes/pkg/apis/extensions/v1beta1"
|
||||||
|
networkingv1 "k8s.io/kubernetes/pkg/apis/networking/v1"
|
||||||
policyv1beta1 "k8s.io/kubernetes/pkg/apis/policy/v1beta1"
|
policyv1beta1 "k8s.io/kubernetes/pkg/apis/policy/v1beta1"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
||||||
rbacv1beta1 "k8s.io/kubernetes/pkg/apis/rbac/v1beta1"
|
rbacv1beta1 "k8s.io/kubernetes/pkg/apis/rbac/v1beta1"
|
||||||
@@ -79,6 +80,7 @@ func AddToScheme(scheme *runtime.Scheme) {
|
|||||||
batchv2alpha1.AddToScheme(scheme)
|
batchv2alpha1.AddToScheme(scheme)
|
||||||
certificatesv1beta1.AddToScheme(scheme)
|
certificatesv1beta1.AddToScheme(scheme)
|
||||||
extensionsv1beta1.AddToScheme(scheme)
|
extensionsv1beta1.AddToScheme(scheme)
|
||||||
|
networkingv1.AddToScheme(scheme)
|
||||||
policyv1beta1.AddToScheme(scheme)
|
policyv1beta1.AddToScheme(scheme)
|
||||||
rbacv1beta1.AddToScheme(scheme)
|
rbacv1beta1.AddToScheme(scheme)
|
||||||
rbacv1alpha1.AddToScheme(scheme)
|
rbacv1alpha1.AddToScheme(scheme)
|
||||||
|
@@ -28,6 +28,7 @@ go_library(
|
|||||||
"//pkg/apis/batch/v2alpha1:go_default_library",
|
"//pkg/apis/batch/v2alpha1:go_default_library",
|
||||||
"//pkg/apis/certificates/v1beta1:go_default_library",
|
"//pkg/apis/certificates/v1beta1:go_default_library",
|
||||||
"//pkg/apis/extensions/v1beta1:go_default_library",
|
"//pkg/apis/extensions/v1beta1:go_default_library",
|
||||||
|
"//pkg/apis/networking/v1:go_default_library",
|
||||||
"//pkg/apis/policy/v1beta1:go_default_library",
|
"//pkg/apis/policy/v1beta1:go_default_library",
|
||||||
"//pkg/apis/rbac/v1alpha1:go_default_library",
|
"//pkg/apis/rbac/v1alpha1:go_default_library",
|
||||||
"//pkg/apis/rbac/v1beta1:go_default_library",
|
"//pkg/apis/rbac/v1beta1:go_default_library",
|
||||||
|
@@ -34,6 +34,7 @@ import (
|
|||||||
batchv2alpha1 "k8s.io/kubernetes/pkg/apis/batch/v2alpha1"
|
batchv2alpha1 "k8s.io/kubernetes/pkg/apis/batch/v2alpha1"
|
||||||
certificatesv1beta1 "k8s.io/kubernetes/pkg/apis/certificates/v1beta1"
|
certificatesv1beta1 "k8s.io/kubernetes/pkg/apis/certificates/v1beta1"
|
||||||
extensionsv1beta1 "k8s.io/kubernetes/pkg/apis/extensions/v1beta1"
|
extensionsv1beta1 "k8s.io/kubernetes/pkg/apis/extensions/v1beta1"
|
||||||
|
networkingv1 "k8s.io/kubernetes/pkg/apis/networking/v1"
|
||||||
policyv1beta1 "k8s.io/kubernetes/pkg/apis/policy/v1beta1"
|
policyv1beta1 "k8s.io/kubernetes/pkg/apis/policy/v1beta1"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
||||||
rbacv1beta1 "k8s.io/kubernetes/pkg/apis/rbac/v1beta1"
|
rbacv1beta1 "k8s.io/kubernetes/pkg/apis/rbac/v1beta1"
|
||||||
@@ -79,6 +80,7 @@ func AddToScheme(scheme *runtime.Scheme) {
|
|||||||
batchv2alpha1.AddToScheme(scheme)
|
batchv2alpha1.AddToScheme(scheme)
|
||||||
certificatesv1beta1.AddToScheme(scheme)
|
certificatesv1beta1.AddToScheme(scheme)
|
||||||
extensionsv1beta1.AddToScheme(scheme)
|
extensionsv1beta1.AddToScheme(scheme)
|
||||||
|
networkingv1.AddToScheme(scheme)
|
||||||
policyv1beta1.AddToScheme(scheme)
|
policyv1beta1.AddToScheme(scheme)
|
||||||
rbacv1beta1.AddToScheme(scheme)
|
rbacv1beta1.AddToScheme(scheme)
|
||||||
rbacv1alpha1.AddToScheme(scheme)
|
rbacv1alpha1.AddToScheme(scheme)
|
||||||
|
@@ -0,0 +1,44 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = [
|
||||||
|
"doc.go",
|
||||||
|
"generated_expansion.go",
|
||||||
|
"networking_client.go",
|
||||||
|
"networkpolicy.go",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/apis/networking/v1:go_default_library",
|
||||||
|
"//pkg/client/clientset_generated/clientset/scheme:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/runtime/serializer:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/types:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/watch:go_default_library",
|
||||||
|
"//vendor/k8s.io/client-go/rest:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [
|
||||||
|
":package-srcs",
|
||||||
|
"//pkg/client/clientset_generated/clientset/typed/networking/v1/fake:all-srcs",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
@@ -0,0 +1,20 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This package is generated by client-gen with custom arguments.
|
||||||
|
|
||||||
|
// This package has the automatically generated typed clients.
|
||||||
|
package v1
|
@@ -0,0 +1,42 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = [
|
||||||
|
"doc.go",
|
||||||
|
"fake_networking_client.go",
|
||||||
|
"fake_networkpolicy.go",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/apis/networking/v1:go_default_library",
|
||||||
|
"//pkg/client/clientset_generated/clientset/typed/networking/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/labels:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/runtime/schema:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/types:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/watch:go_default_library",
|
||||||
|
"//vendor/k8s.io/client-go/rest:go_default_library",
|
||||||
|
"//vendor/k8s.io/client-go/testing:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [":package-srcs"],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
@@ -0,0 +1,20 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This package is generated by client-gen with custom arguments.
|
||||||
|
|
||||||
|
// Package fake has the automatically generated clients.
|
||||||
|
package fake
|
@@ -0,0 +1,38 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package fake
|
||||||
|
|
||||||
|
import (
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
testing "k8s.io/client-go/testing"
|
||||||
|
v1 "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/typed/networking/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
type FakeNetworkingV1 struct {
|
||||||
|
*testing.Fake
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeNetworkingV1) NetworkPolicies(namespace string) v1.NetworkPolicyInterface {
|
||||||
|
return &FakeNetworkPolicies{c, namespace}
|
||||||
|
}
|
||||||
|
|
||||||
|
// RESTClient returns a RESTClient that is used to communicate
|
||||||
|
// with API server by this client implementation.
|
||||||
|
func (c *FakeNetworkingV1) RESTClient() rest.Interface {
|
||||||
|
var ret *rest.RESTClient
|
||||||
|
return ret
|
||||||
|
}
|
@@ -0,0 +1,120 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package fake
|
||||||
|
|
||||||
|
import (
|
||||||
|
meta_v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
labels "k8s.io/apimachinery/pkg/labels"
|
||||||
|
schema "k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
testing "k8s.io/client-go/testing"
|
||||||
|
v1 "k8s.io/kubernetes/pkg/apis/networking/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
// FakeNetworkPolicies implements NetworkPolicyInterface
|
||||||
|
type FakeNetworkPolicies struct {
|
||||||
|
Fake *FakeNetworkingV1
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
var networkpoliciesResource = schema.GroupVersionResource{Group: "networking.k8s.io", Version: "v1", Resource: "networkpolicies"}
|
||||||
|
|
||||||
|
var networkpoliciesKind = schema.GroupVersionKind{Group: "networking.k8s.io", Version: "v1", Kind: "NetworkPolicy"}
|
||||||
|
|
||||||
|
func (c *FakeNetworkPolicies) Create(networkPolicy *v1.NetworkPolicy) (result *v1.NetworkPolicy, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewCreateAction(networkpoliciesResource, c.ns, networkPolicy), &v1.NetworkPolicy{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1.NetworkPolicy), err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeNetworkPolicies) Update(networkPolicy *v1.NetworkPolicy) (result *v1.NetworkPolicy, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewUpdateAction(networkpoliciesResource, c.ns, networkPolicy), &v1.NetworkPolicy{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1.NetworkPolicy), err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeNetworkPolicies) Delete(name string, options *meta_v1.DeleteOptions) error {
|
||||||
|
_, err := c.Fake.
|
||||||
|
Invokes(testing.NewDeleteAction(networkpoliciesResource, c.ns, name), &v1.NetworkPolicy{})
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeNetworkPolicies) DeleteCollection(options *meta_v1.DeleteOptions, listOptions meta_v1.ListOptions) error {
|
||||||
|
action := testing.NewDeleteCollectionAction(networkpoliciesResource, c.ns, listOptions)
|
||||||
|
|
||||||
|
_, err := c.Fake.Invokes(action, &v1.NetworkPolicyList{})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeNetworkPolicies) Get(name string, options meta_v1.GetOptions) (result *v1.NetworkPolicy, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewGetAction(networkpoliciesResource, c.ns, name), &v1.NetworkPolicy{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1.NetworkPolicy), err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeNetworkPolicies) List(opts meta_v1.ListOptions) (result *v1.NetworkPolicyList, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewListAction(networkpoliciesResource, networkpoliciesKind, c.ns, opts), &v1.NetworkPolicyList{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
label, _, _ := testing.ExtractFromListOptions(opts)
|
||||||
|
if label == nil {
|
||||||
|
label = labels.Everything()
|
||||||
|
}
|
||||||
|
list := &v1.NetworkPolicyList{}
|
||||||
|
for _, item := range obj.(*v1.NetworkPolicyList).Items {
|
||||||
|
if label.Matches(labels.Set(item.Labels)) {
|
||||||
|
list.Items = append(list.Items, item)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return list, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested networkPolicies.
|
||||||
|
func (c *FakeNetworkPolicies) Watch(opts meta_v1.ListOptions) (watch.Interface, error) {
|
||||||
|
return c.Fake.
|
||||||
|
InvokesWatch(testing.NewWatchAction(networkpoliciesResource, c.ns, opts))
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched networkPolicy.
|
||||||
|
func (c *FakeNetworkPolicies) Patch(name string, pt types.PatchType, data []byte, subresources ...string) (result *v1.NetworkPolicy, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewPatchSubresourceAction(networkpoliciesResource, c.ns, name, data, subresources...), &v1.NetworkPolicy{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*v1.NetworkPolicy), err
|
||||||
|
}
|
@@ -0,0 +1,19 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
type NetworkPolicyExpansion interface{}
|
@@ -0,0 +1,88 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
import (
|
||||||
|
serializer "k8s.io/apimachinery/pkg/runtime/serializer"
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
v1 "k8s.io/kubernetes/pkg/apis/networking/v1"
|
||||||
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset/scheme"
|
||||||
|
)
|
||||||
|
|
||||||
|
type NetworkingV1Interface interface {
|
||||||
|
RESTClient() rest.Interface
|
||||||
|
NetworkPoliciesGetter
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkingV1Client is used to interact with features provided by the networking.k8s.io group.
|
||||||
|
type NetworkingV1Client struct {
|
||||||
|
restClient rest.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *NetworkingV1Client) NetworkPolicies(namespace string) NetworkPolicyInterface {
|
||||||
|
return newNetworkPolicies(c, namespace)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewForConfig creates a new NetworkingV1Client for the given config.
|
||||||
|
func NewForConfig(c *rest.Config) (*NetworkingV1Client, error) {
|
||||||
|
config := *c
|
||||||
|
if err := setConfigDefaults(&config); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
client, err := rest.RESTClientFor(&config)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &NetworkingV1Client{client}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewForConfigOrDie creates a new NetworkingV1Client for the given config and
|
||||||
|
// panics if there is an error in the config.
|
||||||
|
func NewForConfigOrDie(c *rest.Config) *NetworkingV1Client {
|
||||||
|
client, err := NewForConfig(c)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
return client
|
||||||
|
}
|
||||||
|
|
||||||
|
// New creates a new NetworkingV1Client for the given RESTClient.
|
||||||
|
func New(c rest.Interface) *NetworkingV1Client {
|
||||||
|
return &NetworkingV1Client{c}
|
||||||
|
}
|
||||||
|
|
||||||
|
func setConfigDefaults(config *rest.Config) error {
|
||||||
|
gv := v1.SchemeGroupVersion
|
||||||
|
config.GroupVersion = &gv
|
||||||
|
config.APIPath = "/apis"
|
||||||
|
config.NegotiatedSerializer = serializer.DirectCodecFactory{CodecFactory: scheme.Codecs}
|
||||||
|
|
||||||
|
if config.UserAgent == "" {
|
||||||
|
config.UserAgent = rest.DefaultKubernetesUserAgent()
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RESTClient returns a RESTClient that is used to communicate
|
||||||
|
// with API server by this client implementation.
|
||||||
|
func (c *NetworkingV1Client) RESTClient() rest.Interface {
|
||||||
|
if c == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return c.restClient
|
||||||
|
}
|
@@ -0,0 +1,155 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
import (
|
||||||
|
meta_v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
v1 "k8s.io/kubernetes/pkg/apis/networking/v1"
|
||||||
|
scheme "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/scheme"
|
||||||
|
)
|
||||||
|
|
||||||
|
// NetworkPoliciesGetter has a method to return a NetworkPolicyInterface.
|
||||||
|
// A group's client should implement this interface.
|
||||||
|
type NetworkPoliciesGetter interface {
|
||||||
|
NetworkPolicies(namespace string) NetworkPolicyInterface
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyInterface has methods to work with NetworkPolicy resources.
|
||||||
|
type NetworkPolicyInterface interface {
|
||||||
|
Create(*v1.NetworkPolicy) (*v1.NetworkPolicy, error)
|
||||||
|
Update(*v1.NetworkPolicy) (*v1.NetworkPolicy, error)
|
||||||
|
Delete(name string, options *meta_v1.DeleteOptions) error
|
||||||
|
DeleteCollection(options *meta_v1.DeleteOptions, listOptions meta_v1.ListOptions) error
|
||||||
|
Get(name string, options meta_v1.GetOptions) (*v1.NetworkPolicy, error)
|
||||||
|
List(opts meta_v1.ListOptions) (*v1.NetworkPolicyList, error)
|
||||||
|
Watch(opts meta_v1.ListOptions) (watch.Interface, error)
|
||||||
|
Patch(name string, pt types.PatchType, data []byte, subresources ...string) (result *v1.NetworkPolicy, err error)
|
||||||
|
NetworkPolicyExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// networkPolicies implements NetworkPolicyInterface
|
||||||
|
type networkPolicies struct {
|
||||||
|
client rest.Interface
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
// newNetworkPolicies returns a NetworkPolicies
|
||||||
|
func newNetworkPolicies(c *NetworkingV1Client, namespace string) *networkPolicies {
|
||||||
|
return &networkPolicies{
|
||||||
|
client: c.RESTClient(),
|
||||||
|
ns: namespace,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a networkPolicy and creates it. Returns the server's representation of the networkPolicy, and an error, if there is any.
|
||||||
|
func (c *networkPolicies) Create(networkPolicy *v1.NetworkPolicy) (result *v1.NetworkPolicy, err error) {
|
||||||
|
result = &v1.NetworkPolicy{}
|
||||||
|
err = c.client.Post().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
Body(networkPolicy).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a networkPolicy and updates it. Returns the server's representation of the networkPolicy, and an error, if there is any.
|
||||||
|
func (c *networkPolicies) Update(networkPolicy *v1.NetworkPolicy) (result *v1.NetworkPolicy, err error) {
|
||||||
|
result = &v1.NetworkPolicy{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
Name(networkPolicy.Name).
|
||||||
|
Body(networkPolicy).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the networkPolicy and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *networkPolicies) Delete(name string, options *meta_v1.DeleteOptions) error {
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
Name(name).
|
||||||
|
Body(options).
|
||||||
|
Do().
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *networkPolicies) DeleteCollection(options *meta_v1.DeleteOptions, listOptions meta_v1.ListOptions) error {
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
VersionedParams(&listOptions, scheme.ParameterCodec).
|
||||||
|
Body(options).
|
||||||
|
Do().
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get takes name of the networkPolicy, and returns the corresponding networkPolicy object, and an error if there is any.
|
||||||
|
func (c *networkPolicies) Get(name string, options meta_v1.GetOptions) (result *v1.NetworkPolicy, err error) {
|
||||||
|
result = &v1.NetworkPolicy{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
Name(name).
|
||||||
|
VersionedParams(&options, scheme.ParameterCodec).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of NetworkPolicies that match those selectors.
|
||||||
|
func (c *networkPolicies) List(opts meta_v1.ListOptions) (result *v1.NetworkPolicyList, err error) {
|
||||||
|
result = &v1.NetworkPolicyList{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested networkPolicies.
|
||||||
|
func (c *networkPolicies) Watch(opts meta_v1.ListOptions) (watch.Interface, error) {
|
||||||
|
opts.Watch = true
|
||||||
|
return c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Watch()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched networkPolicy.
|
||||||
|
func (c *networkPolicies) Patch(name string, pt types.PatchType, data []byte, subresources ...string) (result *v1.NetworkPolicy, err error) {
|
||||||
|
result = &v1.NetworkPolicy{}
|
||||||
|
err = c.client.Patch(pt).
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
SubResource(subresources...).
|
||||||
|
Name(name).
|
||||||
|
Body(data).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
@@ -24,6 +24,7 @@ go_library(
|
|||||||
"//pkg/client/clientset_generated/internalclientset/typed/certificates/internalversion:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset/typed/certificates/internalversion:go_default_library",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/core/internalversion:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset/typed/core/internalversion:go_default_library",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion:go_default_library",
|
||||||
|
"//pkg/client/clientset_generated/internalclientset/typed/networking/internalversion:go_default_library",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/policy/internalversion:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset/typed/policy/internalversion:go_default_library",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/rbac/internalversion:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset/typed/rbac/internalversion:go_default_library",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/settings/internalversion:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset/typed/settings/internalversion:go_default_library",
|
||||||
@@ -57,6 +58,7 @@ filegroup(
|
|||||||
"//pkg/client/clientset_generated/internalclientset/typed/certificates/internalversion:all-srcs",
|
"//pkg/client/clientset_generated/internalclientset/typed/certificates/internalversion:all-srcs",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/core/internalversion:all-srcs",
|
"//pkg/client/clientset_generated/internalclientset/typed/core/internalversion:all-srcs",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion:all-srcs",
|
"//pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion:all-srcs",
|
||||||
|
"//pkg/client/clientset_generated/internalclientset/typed/networking/internalversion:all-srcs",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/policy/internalversion:all-srcs",
|
"//pkg/client/clientset_generated/internalclientset/typed/policy/internalversion:all-srcs",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/rbac/internalversion:all-srcs",
|
"//pkg/client/clientset_generated/internalclientset/typed/rbac/internalversion:all-srcs",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/settings/internalversion:all-srcs",
|
"//pkg/client/clientset_generated/internalclientset/typed/settings/internalversion:all-srcs",
|
||||||
|
@@ -30,6 +30,7 @@ import (
|
|||||||
certificatesinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/certificates/internalversion"
|
certificatesinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/certificates/internalversion"
|
||||||
coreinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/core/internalversion"
|
coreinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/core/internalversion"
|
||||||
extensionsinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion"
|
extensionsinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion"
|
||||||
|
networkinginternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/networking/internalversion"
|
||||||
policyinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/policy/internalversion"
|
policyinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/policy/internalversion"
|
||||||
rbacinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/rbac/internalversion"
|
rbacinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/rbac/internalversion"
|
||||||
settingsinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/settings/internalversion"
|
settingsinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/settings/internalversion"
|
||||||
@@ -47,6 +48,7 @@ type Interface interface {
|
|||||||
Batch() batchinternalversion.BatchInterface
|
Batch() batchinternalversion.BatchInterface
|
||||||
Certificates() certificatesinternalversion.CertificatesInterface
|
Certificates() certificatesinternalversion.CertificatesInterface
|
||||||
Extensions() extensionsinternalversion.ExtensionsInterface
|
Extensions() extensionsinternalversion.ExtensionsInterface
|
||||||
|
Networking() networkinginternalversion.NetworkingInterface
|
||||||
Policy() policyinternalversion.PolicyInterface
|
Policy() policyinternalversion.PolicyInterface
|
||||||
Rbac() rbacinternalversion.RbacInterface
|
Rbac() rbacinternalversion.RbacInterface
|
||||||
Settings() settingsinternalversion.SettingsInterface
|
Settings() settingsinternalversion.SettingsInterface
|
||||||
@@ -66,6 +68,7 @@ type Clientset struct {
|
|||||||
*batchinternalversion.BatchClient
|
*batchinternalversion.BatchClient
|
||||||
*certificatesinternalversion.CertificatesClient
|
*certificatesinternalversion.CertificatesClient
|
||||||
*extensionsinternalversion.ExtensionsClient
|
*extensionsinternalversion.ExtensionsClient
|
||||||
|
*networkinginternalversion.NetworkingClient
|
||||||
*policyinternalversion.PolicyClient
|
*policyinternalversion.PolicyClient
|
||||||
*rbacinternalversion.RbacClient
|
*rbacinternalversion.RbacClient
|
||||||
*settingsinternalversion.SettingsClient
|
*settingsinternalversion.SettingsClient
|
||||||
@@ -144,6 +147,14 @@ func (c *Clientset) Extensions() extensionsinternalversion.ExtensionsInterface {
|
|||||||
return c.ExtensionsClient
|
return c.ExtensionsClient
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Networking retrieves the NetworkingClient
|
||||||
|
func (c *Clientset) Networking() networkinginternalversion.NetworkingInterface {
|
||||||
|
if c == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return c.NetworkingClient
|
||||||
|
}
|
||||||
|
|
||||||
// Policy retrieves the PolicyClient
|
// Policy retrieves the PolicyClient
|
||||||
func (c *Clientset) Policy() policyinternalversion.PolicyInterface {
|
func (c *Clientset) Policy() policyinternalversion.PolicyInterface {
|
||||||
if c == nil {
|
if c == nil {
|
||||||
@@ -228,6 +239,10 @@ func NewForConfig(c *rest.Config) (*Clientset, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
cs.NetworkingClient, err = networkinginternalversion.NewForConfig(&configShallowCopy)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
cs.PolicyClient, err = policyinternalversion.NewForConfig(&configShallowCopy)
|
cs.PolicyClient, err = policyinternalversion.NewForConfig(&configShallowCopy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@@ -266,6 +281,7 @@ func NewForConfigOrDie(c *rest.Config) *Clientset {
|
|||||||
cs.BatchClient = batchinternalversion.NewForConfigOrDie(c)
|
cs.BatchClient = batchinternalversion.NewForConfigOrDie(c)
|
||||||
cs.CertificatesClient = certificatesinternalversion.NewForConfigOrDie(c)
|
cs.CertificatesClient = certificatesinternalversion.NewForConfigOrDie(c)
|
||||||
cs.ExtensionsClient = extensionsinternalversion.NewForConfigOrDie(c)
|
cs.ExtensionsClient = extensionsinternalversion.NewForConfigOrDie(c)
|
||||||
|
cs.NetworkingClient = networkinginternalversion.NewForConfigOrDie(c)
|
||||||
cs.PolicyClient = policyinternalversion.NewForConfigOrDie(c)
|
cs.PolicyClient = policyinternalversion.NewForConfigOrDie(c)
|
||||||
cs.RbacClient = rbacinternalversion.NewForConfigOrDie(c)
|
cs.RbacClient = rbacinternalversion.NewForConfigOrDie(c)
|
||||||
cs.SettingsClient = settingsinternalversion.NewForConfigOrDie(c)
|
cs.SettingsClient = settingsinternalversion.NewForConfigOrDie(c)
|
||||||
@@ -287,6 +303,7 @@ func New(c rest.Interface) *Clientset {
|
|||||||
cs.BatchClient = batchinternalversion.New(c)
|
cs.BatchClient = batchinternalversion.New(c)
|
||||||
cs.CertificatesClient = certificatesinternalversion.New(c)
|
cs.CertificatesClient = certificatesinternalversion.New(c)
|
||||||
cs.ExtensionsClient = extensionsinternalversion.New(c)
|
cs.ExtensionsClient = extensionsinternalversion.New(c)
|
||||||
|
cs.NetworkingClient = networkinginternalversion.New(c)
|
||||||
cs.PolicyClient = policyinternalversion.New(c)
|
cs.PolicyClient = policyinternalversion.New(c)
|
||||||
cs.RbacClient = rbacinternalversion.New(c)
|
cs.RbacClient = rbacinternalversion.New(c)
|
||||||
cs.SettingsClient = settingsinternalversion.New(c)
|
cs.SettingsClient = settingsinternalversion.New(c)
|
||||||
|
@@ -25,6 +25,7 @@ go_library(
|
|||||||
"//pkg/apis/batch:go_default_library",
|
"//pkg/apis/batch:go_default_library",
|
||||||
"//pkg/apis/certificates:go_default_library",
|
"//pkg/apis/certificates:go_default_library",
|
||||||
"//pkg/apis/extensions:go_default_library",
|
"//pkg/apis/extensions:go_default_library",
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
"//pkg/apis/policy:go_default_library",
|
"//pkg/apis/policy:go_default_library",
|
||||||
"//pkg/apis/rbac:go_default_library",
|
"//pkg/apis/rbac:go_default_library",
|
||||||
"//pkg/apis/settings:go_default_library",
|
"//pkg/apis/settings:go_default_library",
|
||||||
@@ -48,6 +49,8 @@ go_library(
|
|||||||
"//pkg/client/clientset_generated/internalclientset/typed/core/internalversion/fake:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset/typed/core/internalversion/fake:go_default_library",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion:go_default_library",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion/fake:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion/fake:go_default_library",
|
||||||
|
"//pkg/client/clientset_generated/internalclientset/typed/networking/internalversion:go_default_library",
|
||||||
|
"//pkg/client/clientset_generated/internalclientset/typed/networking/internalversion/fake:go_default_library",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/policy/internalversion:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset/typed/policy/internalversion:go_default_library",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/policy/internalversion/fake:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset/typed/policy/internalversion/fake:go_default_library",
|
||||||
"//pkg/client/clientset_generated/internalclientset/typed/rbac/internalversion:go_default_library",
|
"//pkg/client/clientset_generated/internalclientset/typed/rbac/internalversion:go_default_library",
|
||||||
|
@@ -41,6 +41,8 @@ import (
|
|||||||
fakecoreinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/core/internalversion/fake"
|
fakecoreinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/core/internalversion/fake"
|
||||||
extensionsinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion"
|
extensionsinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion"
|
||||||
fakeextensionsinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion/fake"
|
fakeextensionsinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/extensions/internalversion/fake"
|
||||||
|
networkinginternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/networking/internalversion"
|
||||||
|
fakenetworkinginternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/networking/internalversion/fake"
|
||||||
policyinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/policy/internalversion"
|
policyinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/policy/internalversion"
|
||||||
fakepolicyinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/policy/internalversion/fake"
|
fakepolicyinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/policy/internalversion/fake"
|
||||||
rbacinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/rbac/internalversion"
|
rbacinternalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/rbac/internalversion"
|
||||||
@@ -129,6 +131,11 @@ func (c *Clientset) Extensions() extensionsinternalversion.ExtensionsInterface {
|
|||||||
return &fakeextensionsinternalversion.FakeExtensions{Fake: &c.Fake}
|
return &fakeextensionsinternalversion.FakeExtensions{Fake: &c.Fake}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Networking retrieves the NetworkingClient
|
||||||
|
func (c *Clientset) Networking() networkinginternalversion.NetworkingInterface {
|
||||||
|
return &fakenetworkinginternalversion.FakeNetworking{Fake: &c.Fake}
|
||||||
|
}
|
||||||
|
|
||||||
// Policy retrieves the PolicyClient
|
// Policy retrieves the PolicyClient
|
||||||
func (c *Clientset) Policy() policyinternalversion.PolicyInterface {
|
func (c *Clientset) Policy() policyinternalversion.PolicyInterface {
|
||||||
return &fakepolicyinternalversion.FakePolicy{Fake: &c.Fake}
|
return &fakepolicyinternalversion.FakePolicy{Fake: &c.Fake}
|
||||||
|
@@ -30,6 +30,7 @@ import (
|
|||||||
batchinternalversion "k8s.io/kubernetes/pkg/apis/batch"
|
batchinternalversion "k8s.io/kubernetes/pkg/apis/batch"
|
||||||
certificatesinternalversion "k8s.io/kubernetes/pkg/apis/certificates"
|
certificatesinternalversion "k8s.io/kubernetes/pkg/apis/certificates"
|
||||||
extensionsinternalversion "k8s.io/kubernetes/pkg/apis/extensions"
|
extensionsinternalversion "k8s.io/kubernetes/pkg/apis/extensions"
|
||||||
|
networkinginternalversion "k8s.io/kubernetes/pkg/apis/networking"
|
||||||
policyinternalversion "k8s.io/kubernetes/pkg/apis/policy"
|
policyinternalversion "k8s.io/kubernetes/pkg/apis/policy"
|
||||||
rbacinternalversion "k8s.io/kubernetes/pkg/apis/rbac"
|
rbacinternalversion "k8s.io/kubernetes/pkg/apis/rbac"
|
||||||
settingsinternalversion "k8s.io/kubernetes/pkg/apis/settings"
|
settingsinternalversion "k8s.io/kubernetes/pkg/apis/settings"
|
||||||
@@ -69,6 +70,7 @@ func AddToScheme(scheme *runtime.Scheme) {
|
|||||||
batchinternalversion.AddToScheme(scheme)
|
batchinternalversion.AddToScheme(scheme)
|
||||||
certificatesinternalversion.AddToScheme(scheme)
|
certificatesinternalversion.AddToScheme(scheme)
|
||||||
extensionsinternalversion.AddToScheme(scheme)
|
extensionsinternalversion.AddToScheme(scheme)
|
||||||
|
networkinginternalversion.AddToScheme(scheme)
|
||||||
policyinternalversion.AddToScheme(scheme)
|
policyinternalversion.AddToScheme(scheme)
|
||||||
rbacinternalversion.AddToScheme(scheme)
|
rbacinternalversion.AddToScheme(scheme)
|
||||||
settingsinternalversion.AddToScheme(scheme)
|
settingsinternalversion.AddToScheme(scheme)
|
||||||
|
@@ -26,6 +26,7 @@ go_library(
|
|||||||
"//pkg/apis/certificates/install:go_default_library",
|
"//pkg/apis/certificates/install:go_default_library",
|
||||||
"//pkg/apis/componentconfig/install:go_default_library",
|
"//pkg/apis/componentconfig/install:go_default_library",
|
||||||
"//pkg/apis/extensions/install:go_default_library",
|
"//pkg/apis/extensions/install:go_default_library",
|
||||||
|
"//pkg/apis/networking/install:go_default_library",
|
||||||
"//pkg/apis/policy/install:go_default_library",
|
"//pkg/apis/policy/install:go_default_library",
|
||||||
"//pkg/apis/rbac/install:go_default_library",
|
"//pkg/apis/rbac/install:go_default_library",
|
||||||
"//pkg/apis/settings/install:go_default_library",
|
"//pkg/apis/settings/install:go_default_library",
|
||||||
|
@@ -32,6 +32,7 @@ import (
|
|||||||
batch "k8s.io/kubernetes/pkg/apis/batch/install"
|
batch "k8s.io/kubernetes/pkg/apis/batch/install"
|
||||||
certificates "k8s.io/kubernetes/pkg/apis/certificates/install"
|
certificates "k8s.io/kubernetes/pkg/apis/certificates/install"
|
||||||
extensions "k8s.io/kubernetes/pkg/apis/extensions/install"
|
extensions "k8s.io/kubernetes/pkg/apis/extensions/install"
|
||||||
|
networking "k8s.io/kubernetes/pkg/apis/networking/install"
|
||||||
policy "k8s.io/kubernetes/pkg/apis/policy/install"
|
policy "k8s.io/kubernetes/pkg/apis/policy/install"
|
||||||
rbac "k8s.io/kubernetes/pkg/apis/rbac/install"
|
rbac "k8s.io/kubernetes/pkg/apis/rbac/install"
|
||||||
settings "k8s.io/kubernetes/pkg/apis/settings/install"
|
settings "k8s.io/kubernetes/pkg/apis/settings/install"
|
||||||
@@ -62,6 +63,7 @@ func Install(groupFactoryRegistry announced.APIGroupFactoryRegistry, registry *r
|
|||||||
batch.Install(groupFactoryRegistry, registry, scheme)
|
batch.Install(groupFactoryRegistry, registry, scheme)
|
||||||
certificates.Install(groupFactoryRegistry, registry, scheme)
|
certificates.Install(groupFactoryRegistry, registry, scheme)
|
||||||
extensions.Install(groupFactoryRegistry, registry, scheme)
|
extensions.Install(groupFactoryRegistry, registry, scheme)
|
||||||
|
networking.Install(groupFactoryRegistry, registry, scheme)
|
||||||
policy.Install(groupFactoryRegistry, registry, scheme)
|
policy.Install(groupFactoryRegistry, registry, scheme)
|
||||||
rbac.Install(groupFactoryRegistry, registry, scheme)
|
rbac.Install(groupFactoryRegistry, registry, scheme)
|
||||||
settings.Install(groupFactoryRegistry, registry, scheme)
|
settings.Install(groupFactoryRegistry, registry, scheme)
|
||||||
|
@@ -0,0 +1,43 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = [
|
||||||
|
"doc.go",
|
||||||
|
"generated_expansion.go",
|
||||||
|
"networking_client.go",
|
||||||
|
"networkpolicy.go",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
|
"//pkg/client/clientset_generated/internalclientset/scheme:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/types:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/watch:go_default_library",
|
||||||
|
"//vendor/k8s.io/client-go/rest:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [
|
||||||
|
":package-srcs",
|
||||||
|
"//pkg/client/clientset_generated/internalclientset/typed/networking/internalversion/fake:all-srcs",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
@@ -0,0 +1,20 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This package is generated by client-gen with the default arguments.
|
||||||
|
|
||||||
|
// This package has the automatically generated typed clients.
|
||||||
|
package internalversion
|
@@ -0,0 +1,42 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = [
|
||||||
|
"doc.go",
|
||||||
|
"fake_networking_client.go",
|
||||||
|
"fake_networkpolicy.go",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
|
"//pkg/client/clientset_generated/internalclientset/typed/networking/internalversion:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/labels:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/runtime/schema:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/types:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/watch:go_default_library",
|
||||||
|
"//vendor/k8s.io/client-go/rest:go_default_library",
|
||||||
|
"//vendor/k8s.io/client-go/testing:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [":package-srcs"],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
@@ -0,0 +1,20 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This package is generated by client-gen with the default arguments.
|
||||||
|
|
||||||
|
// Package fake has the automatically generated clients.
|
||||||
|
package fake
|
@@ -0,0 +1,38 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package fake
|
||||||
|
|
||||||
|
import (
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
testing "k8s.io/client-go/testing"
|
||||||
|
internalversion "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/typed/networking/internalversion"
|
||||||
|
)
|
||||||
|
|
||||||
|
type FakeNetworking struct {
|
||||||
|
*testing.Fake
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeNetworking) NetworkPolicies(namespace string) internalversion.NetworkPolicyInterface {
|
||||||
|
return &FakeNetworkPolicies{c, namespace}
|
||||||
|
}
|
||||||
|
|
||||||
|
// RESTClient returns a RESTClient that is used to communicate
|
||||||
|
// with API server by this client implementation.
|
||||||
|
func (c *FakeNetworking) RESTClient() rest.Interface {
|
||||||
|
var ret *rest.RESTClient
|
||||||
|
return ret
|
||||||
|
}
|
@@ -0,0 +1,120 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package fake
|
||||||
|
|
||||||
|
import (
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
labels "k8s.io/apimachinery/pkg/labels"
|
||||||
|
schema "k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
testing "k8s.io/client-go/testing"
|
||||||
|
networking "k8s.io/kubernetes/pkg/apis/networking"
|
||||||
|
)
|
||||||
|
|
||||||
|
// FakeNetworkPolicies implements NetworkPolicyInterface
|
||||||
|
type FakeNetworkPolicies struct {
|
||||||
|
Fake *FakeNetworking
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
var networkpoliciesResource = schema.GroupVersionResource{Group: "networking.k8s.io", Version: "", Resource: "networkpolicies"}
|
||||||
|
|
||||||
|
var networkpoliciesKind = schema.GroupVersionKind{Group: "networking.k8s.io", Version: "", Kind: "NetworkPolicy"}
|
||||||
|
|
||||||
|
func (c *FakeNetworkPolicies) Create(networkPolicy *networking.NetworkPolicy) (result *networking.NetworkPolicy, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewCreateAction(networkpoliciesResource, c.ns, networkPolicy), &networking.NetworkPolicy{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*networking.NetworkPolicy), err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeNetworkPolicies) Update(networkPolicy *networking.NetworkPolicy) (result *networking.NetworkPolicy, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewUpdateAction(networkpoliciesResource, c.ns, networkPolicy), &networking.NetworkPolicy{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*networking.NetworkPolicy), err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeNetworkPolicies) Delete(name string, options *v1.DeleteOptions) error {
|
||||||
|
_, err := c.Fake.
|
||||||
|
Invokes(testing.NewDeleteAction(networkpoliciesResource, c.ns, name), &networking.NetworkPolicy{})
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeNetworkPolicies) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {
|
||||||
|
action := testing.NewDeleteCollectionAction(networkpoliciesResource, c.ns, listOptions)
|
||||||
|
|
||||||
|
_, err := c.Fake.Invokes(action, &networking.NetworkPolicyList{})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeNetworkPolicies) Get(name string, options v1.GetOptions) (result *networking.NetworkPolicy, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewGetAction(networkpoliciesResource, c.ns, name), &networking.NetworkPolicy{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*networking.NetworkPolicy), err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *FakeNetworkPolicies) List(opts v1.ListOptions) (result *networking.NetworkPolicyList, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewListAction(networkpoliciesResource, networkpoliciesKind, c.ns, opts), &networking.NetworkPolicyList{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
label, _, _ := testing.ExtractFromListOptions(opts)
|
||||||
|
if label == nil {
|
||||||
|
label = labels.Everything()
|
||||||
|
}
|
||||||
|
list := &networking.NetworkPolicyList{}
|
||||||
|
for _, item := range obj.(*networking.NetworkPolicyList).Items {
|
||||||
|
if label.Matches(labels.Set(item.Labels)) {
|
||||||
|
list.Items = append(list.Items, item)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return list, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested networkPolicies.
|
||||||
|
func (c *FakeNetworkPolicies) Watch(opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
return c.Fake.
|
||||||
|
InvokesWatch(testing.NewWatchAction(networkpoliciesResource, c.ns, opts))
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched networkPolicy.
|
||||||
|
func (c *FakeNetworkPolicies) Patch(name string, pt types.PatchType, data []byte, subresources ...string) (result *networking.NetworkPolicy, err error) {
|
||||||
|
obj, err := c.Fake.
|
||||||
|
Invokes(testing.NewPatchSubresourceAction(networkpoliciesResource, c.ns, name, data, subresources...), &networking.NetworkPolicy{})
|
||||||
|
|
||||||
|
if obj == nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return obj.(*networking.NetworkPolicy), err
|
||||||
|
}
|
@@ -0,0 +1,19 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package internalversion
|
||||||
|
|
||||||
|
type NetworkPolicyExpansion interface{}
|
@@ -0,0 +1,99 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package internalversion
|
||||||
|
|
||||||
|
import (
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
"k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/scheme"
|
||||||
|
)
|
||||||
|
|
||||||
|
type NetworkingInterface interface {
|
||||||
|
RESTClient() rest.Interface
|
||||||
|
NetworkPoliciesGetter
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkingClient is used to interact with features provided by the networking.k8s.io group.
|
||||||
|
type NetworkingClient struct {
|
||||||
|
restClient rest.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *NetworkingClient) NetworkPolicies(namespace string) NetworkPolicyInterface {
|
||||||
|
return newNetworkPolicies(c, namespace)
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewForConfig creates a new NetworkingClient for the given config.
|
||||||
|
func NewForConfig(c *rest.Config) (*NetworkingClient, error) {
|
||||||
|
config := *c
|
||||||
|
if err := setConfigDefaults(&config); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
client, err := rest.RESTClientFor(&config)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &NetworkingClient{client}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewForConfigOrDie creates a new NetworkingClient for the given config and
|
||||||
|
// panics if there is an error in the config.
|
||||||
|
func NewForConfigOrDie(c *rest.Config) *NetworkingClient {
|
||||||
|
client, err := NewForConfig(c)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
return client
|
||||||
|
}
|
||||||
|
|
||||||
|
// New creates a new NetworkingClient for the given RESTClient.
|
||||||
|
func New(c rest.Interface) *NetworkingClient {
|
||||||
|
return &NetworkingClient{c}
|
||||||
|
}
|
||||||
|
|
||||||
|
func setConfigDefaults(config *rest.Config) error {
|
||||||
|
g, err := scheme.Registry.Group("networking.k8s.io")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
config.APIPath = "/apis"
|
||||||
|
if config.UserAgent == "" {
|
||||||
|
config.UserAgent = rest.DefaultKubernetesUserAgent()
|
||||||
|
}
|
||||||
|
if config.GroupVersion == nil || config.GroupVersion.Group != g.GroupVersion.Group {
|
||||||
|
gv := g.GroupVersion
|
||||||
|
config.GroupVersion = &gv
|
||||||
|
}
|
||||||
|
config.NegotiatedSerializer = scheme.Codecs
|
||||||
|
|
||||||
|
if config.QPS == 0 {
|
||||||
|
config.QPS = 5
|
||||||
|
}
|
||||||
|
if config.Burst == 0 {
|
||||||
|
config.Burst = 10
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RESTClient returns a RESTClient that is used to communicate
|
||||||
|
// with API server by this client implementation.
|
||||||
|
func (c *NetworkingClient) RESTClient() rest.Interface {
|
||||||
|
if c == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return c.restClient
|
||||||
|
}
|
@@ -0,0 +1,155 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package internalversion
|
||||||
|
|
||||||
|
import (
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
types "k8s.io/apimachinery/pkg/types"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
rest "k8s.io/client-go/rest"
|
||||||
|
networking "k8s.io/kubernetes/pkg/apis/networking"
|
||||||
|
scheme "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset/scheme"
|
||||||
|
)
|
||||||
|
|
||||||
|
// NetworkPoliciesGetter has a method to return a NetworkPolicyInterface.
|
||||||
|
// A group's client should implement this interface.
|
||||||
|
type NetworkPoliciesGetter interface {
|
||||||
|
NetworkPolicies(namespace string) NetworkPolicyInterface
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyInterface has methods to work with NetworkPolicy resources.
|
||||||
|
type NetworkPolicyInterface interface {
|
||||||
|
Create(*networking.NetworkPolicy) (*networking.NetworkPolicy, error)
|
||||||
|
Update(*networking.NetworkPolicy) (*networking.NetworkPolicy, error)
|
||||||
|
Delete(name string, options *v1.DeleteOptions) error
|
||||||
|
DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error
|
||||||
|
Get(name string, options v1.GetOptions) (*networking.NetworkPolicy, error)
|
||||||
|
List(opts v1.ListOptions) (*networking.NetworkPolicyList, error)
|
||||||
|
Watch(opts v1.ListOptions) (watch.Interface, error)
|
||||||
|
Patch(name string, pt types.PatchType, data []byte, subresources ...string) (result *networking.NetworkPolicy, err error)
|
||||||
|
NetworkPolicyExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// networkPolicies implements NetworkPolicyInterface
|
||||||
|
type networkPolicies struct {
|
||||||
|
client rest.Interface
|
||||||
|
ns string
|
||||||
|
}
|
||||||
|
|
||||||
|
// newNetworkPolicies returns a NetworkPolicies
|
||||||
|
func newNetworkPolicies(c *NetworkingClient, namespace string) *networkPolicies {
|
||||||
|
return &networkPolicies{
|
||||||
|
client: c.RESTClient(),
|
||||||
|
ns: namespace,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create takes the representation of a networkPolicy and creates it. Returns the server's representation of the networkPolicy, and an error, if there is any.
|
||||||
|
func (c *networkPolicies) Create(networkPolicy *networking.NetworkPolicy) (result *networking.NetworkPolicy, err error) {
|
||||||
|
result = &networking.NetworkPolicy{}
|
||||||
|
err = c.client.Post().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
Body(networkPolicy).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Update takes the representation of a networkPolicy and updates it. Returns the server's representation of the networkPolicy, and an error, if there is any.
|
||||||
|
func (c *networkPolicies) Update(networkPolicy *networking.NetworkPolicy) (result *networking.NetworkPolicy, err error) {
|
||||||
|
result = &networking.NetworkPolicy{}
|
||||||
|
err = c.client.Put().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
Name(networkPolicy.Name).
|
||||||
|
Body(networkPolicy).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Delete takes name of the networkPolicy and deletes it. Returns an error if one occurs.
|
||||||
|
func (c *networkPolicies) Delete(name string, options *v1.DeleteOptions) error {
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
Name(name).
|
||||||
|
Body(options).
|
||||||
|
Do().
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeleteCollection deletes a collection of objects.
|
||||||
|
func (c *networkPolicies) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {
|
||||||
|
return c.client.Delete().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
VersionedParams(&listOptions, scheme.ParameterCodec).
|
||||||
|
Body(options).
|
||||||
|
Do().
|
||||||
|
Error()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get takes name of the networkPolicy, and returns the corresponding networkPolicy object, and an error if there is any.
|
||||||
|
func (c *networkPolicies) Get(name string, options v1.GetOptions) (result *networking.NetworkPolicy, err error) {
|
||||||
|
result = &networking.NetworkPolicy{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
Name(name).
|
||||||
|
VersionedParams(&options, scheme.ParameterCodec).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// List takes label and field selectors, and returns the list of NetworkPolicies that match those selectors.
|
||||||
|
func (c *networkPolicies) List(opts v1.ListOptions) (result *networking.NetworkPolicyList, err error) {
|
||||||
|
result = &networking.NetworkPolicyList{}
|
||||||
|
err = c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Watch returns a watch.Interface that watches the requested networkPolicies.
|
||||||
|
func (c *networkPolicies) Watch(opts v1.ListOptions) (watch.Interface, error) {
|
||||||
|
opts.Watch = true
|
||||||
|
return c.client.Get().
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
VersionedParams(&opts, scheme.ParameterCodec).
|
||||||
|
Watch()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Patch applies the patch and returns the patched networkPolicy.
|
||||||
|
func (c *networkPolicies) Patch(name string, pt types.PatchType, data []byte, subresources ...string) (result *networking.NetworkPolicy, err error) {
|
||||||
|
result = &networking.NetworkPolicy{}
|
||||||
|
err = c.client.Patch(pt).
|
||||||
|
Namespace(c.ns).
|
||||||
|
Resource("networkpolicies").
|
||||||
|
SubResource(subresources...).
|
||||||
|
Name(name).
|
||||||
|
Body(data).
|
||||||
|
Do().
|
||||||
|
Into(result)
|
||||||
|
return
|
||||||
|
}
|
@@ -24,6 +24,7 @@ go_library(
|
|||||||
"//pkg/apis/batch/v2alpha1:go_default_library",
|
"//pkg/apis/batch/v2alpha1:go_default_library",
|
||||||
"//pkg/apis/certificates/v1beta1:go_default_library",
|
"//pkg/apis/certificates/v1beta1:go_default_library",
|
||||||
"//pkg/apis/extensions/v1beta1:go_default_library",
|
"//pkg/apis/extensions/v1beta1:go_default_library",
|
||||||
|
"//pkg/apis/networking/v1:go_default_library",
|
||||||
"//pkg/apis/policy/v1beta1:go_default_library",
|
"//pkg/apis/policy/v1beta1:go_default_library",
|
||||||
"//pkg/apis/rbac/v1alpha1:go_default_library",
|
"//pkg/apis/rbac/v1alpha1:go_default_library",
|
||||||
"//pkg/apis/rbac/v1beta1:go_default_library",
|
"//pkg/apis/rbac/v1beta1:go_default_library",
|
||||||
@@ -39,6 +40,7 @@ go_library(
|
|||||||
"//pkg/client/informers/informers_generated/externalversions/core:go_default_library",
|
"//pkg/client/informers/informers_generated/externalversions/core:go_default_library",
|
||||||
"//pkg/client/informers/informers_generated/externalversions/extensions:go_default_library",
|
"//pkg/client/informers/informers_generated/externalversions/extensions:go_default_library",
|
||||||
"//pkg/client/informers/informers_generated/externalversions/internalinterfaces:go_default_library",
|
"//pkg/client/informers/informers_generated/externalversions/internalinterfaces:go_default_library",
|
||||||
|
"//pkg/client/informers/informers_generated/externalversions/networking:go_default_library",
|
||||||
"//pkg/client/informers/informers_generated/externalversions/policy:go_default_library",
|
"//pkg/client/informers/informers_generated/externalversions/policy:go_default_library",
|
||||||
"//pkg/client/informers/informers_generated/externalversions/rbac:go_default_library",
|
"//pkg/client/informers/informers_generated/externalversions/rbac:go_default_library",
|
||||||
"//pkg/client/informers/informers_generated/externalversions/settings:go_default_library",
|
"//pkg/client/informers/informers_generated/externalversions/settings:go_default_library",
|
||||||
@@ -68,6 +70,7 @@ filegroup(
|
|||||||
"//pkg/client/informers/informers_generated/externalversions/core:all-srcs",
|
"//pkg/client/informers/informers_generated/externalversions/core:all-srcs",
|
||||||
"//pkg/client/informers/informers_generated/externalversions/extensions:all-srcs",
|
"//pkg/client/informers/informers_generated/externalversions/extensions:all-srcs",
|
||||||
"//pkg/client/informers/informers_generated/externalversions/internalinterfaces:all-srcs",
|
"//pkg/client/informers/informers_generated/externalversions/internalinterfaces:all-srcs",
|
||||||
|
"//pkg/client/informers/informers_generated/externalversions/networking:all-srcs",
|
||||||
"//pkg/client/informers/informers_generated/externalversions/policy:all-srcs",
|
"//pkg/client/informers/informers_generated/externalversions/policy:all-srcs",
|
||||||
"//pkg/client/informers/informers_generated/externalversions/rbac:all-srcs",
|
"//pkg/client/informers/informers_generated/externalversions/rbac:all-srcs",
|
||||||
"//pkg/client/informers/informers_generated/externalversions/settings:all-srcs",
|
"//pkg/client/informers/informers_generated/externalversions/settings:all-srcs",
|
||||||
|
@@ -31,6 +31,7 @@ import (
|
|||||||
core "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/core"
|
core "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/core"
|
||||||
extensions "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/extensions"
|
extensions "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/extensions"
|
||||||
internalinterfaces "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/internalinterfaces"
|
internalinterfaces "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/internalinterfaces"
|
||||||
|
networking "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/networking"
|
||||||
policy "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/policy"
|
policy "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/policy"
|
||||||
rbac "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/rbac"
|
rbac "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/rbac"
|
||||||
settings "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/settings"
|
settings "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/settings"
|
||||||
@@ -127,6 +128,7 @@ type SharedInformerFactory interface {
|
|||||||
Certificates() certificates.Interface
|
Certificates() certificates.Interface
|
||||||
Core() core.Interface
|
Core() core.Interface
|
||||||
Extensions() extensions.Interface
|
Extensions() extensions.Interface
|
||||||
|
Networking() networking.Interface
|
||||||
Policy() policy.Interface
|
Policy() policy.Interface
|
||||||
Rbac() rbac.Interface
|
Rbac() rbac.Interface
|
||||||
Settings() settings.Interface
|
Settings() settings.Interface
|
||||||
@@ -161,6 +163,10 @@ func (f *sharedInformerFactory) Extensions() extensions.Interface {
|
|||||||
return extensions.New(f)
|
return extensions.New(f)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (f *sharedInformerFactory) Networking() networking.Interface {
|
||||||
|
return networking.New(f)
|
||||||
|
}
|
||||||
|
|
||||||
func (f *sharedInformerFactory) Policy() policy.Interface {
|
func (f *sharedInformerFactory) Policy() policy.Interface {
|
||||||
return policy.New(f)
|
return policy.New(f)
|
||||||
}
|
}
|
||||||
|
@@ -31,6 +31,7 @@ import (
|
|||||||
batch_v2alpha1 "k8s.io/kubernetes/pkg/apis/batch/v2alpha1"
|
batch_v2alpha1 "k8s.io/kubernetes/pkg/apis/batch/v2alpha1"
|
||||||
certificates_v1beta1 "k8s.io/kubernetes/pkg/apis/certificates/v1beta1"
|
certificates_v1beta1 "k8s.io/kubernetes/pkg/apis/certificates/v1beta1"
|
||||||
extensions_v1beta1 "k8s.io/kubernetes/pkg/apis/extensions/v1beta1"
|
extensions_v1beta1 "k8s.io/kubernetes/pkg/apis/extensions/v1beta1"
|
||||||
|
networking_v1 "k8s.io/kubernetes/pkg/apis/networking/v1"
|
||||||
policy_v1beta1 "k8s.io/kubernetes/pkg/apis/policy/v1beta1"
|
policy_v1beta1 "k8s.io/kubernetes/pkg/apis/policy/v1beta1"
|
||||||
rbac_v1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
rbac_v1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
||||||
rbac_v1beta1 "k8s.io/kubernetes/pkg/apis/rbac/v1beta1"
|
rbac_v1beta1 "k8s.io/kubernetes/pkg/apis/rbac/v1beta1"
|
||||||
@@ -147,6 +148,10 @@ func (f *sharedInformerFactory) ForResource(resource schema.GroupVersionResource
|
|||||||
case extensions_v1beta1.SchemeGroupVersion.WithResource("thirdpartyresources"):
|
case extensions_v1beta1.SchemeGroupVersion.WithResource("thirdpartyresources"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Extensions().V1beta1().ThirdPartyResources().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Extensions().V1beta1().ThirdPartyResources().Informer()}, nil
|
||||||
|
|
||||||
|
// Group=Networking, Version=V1
|
||||||
|
case networking_v1.SchemeGroupVersion.WithResource("networkpolicies"):
|
||||||
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Networking().V1().NetworkPolicies().Informer()}, nil
|
||||||
|
|
||||||
// Group=Policy, Version=V1beta1
|
// Group=Policy, Version=V1beta1
|
||||||
case policy_v1beta1.SchemeGroupVersion.WithResource("poddisruptionbudgets"):
|
case policy_v1beta1.SchemeGroupVersion.WithResource("poddisruptionbudgets"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Policy().V1beta1().PodDisruptionBudgets().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Policy().V1beta1().PodDisruptionBudgets().Informer()}, nil
|
||||||
|
@@ -0,0 +1,34 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = ["interface.go"],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/client/informers/informers_generated/externalversions/internalinterfaces:go_default_library",
|
||||||
|
"//pkg/client/informers/informers_generated/externalversions/networking/v1:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [
|
||||||
|
":package-srcs",
|
||||||
|
"//pkg/client/informers/informers_generated/externalversions/networking/v1:all-srcs",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
@@ -0,0 +1,44 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This file was automatically generated by informer-gen
|
||||||
|
|
||||||
|
package networking
|
||||||
|
|
||||||
|
import (
|
||||||
|
internalinterfaces "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/internalinterfaces"
|
||||||
|
v1 "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/networking/v1"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Interface provides access to each of this group's versions.
|
||||||
|
type Interface interface {
|
||||||
|
// V1 provides access to shared informers for resources in V1.
|
||||||
|
V1() v1.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type group struct {
|
||||||
|
internalinterfaces.SharedInformerFactory
|
||||||
|
}
|
||||||
|
|
||||||
|
// New returns a new Interface.
|
||||||
|
func New(f internalinterfaces.SharedInformerFactory) Interface {
|
||||||
|
return &group{f}
|
||||||
|
}
|
||||||
|
|
||||||
|
// V1 returns a new v1.Interface.
|
||||||
|
func (g *group) V1() v1.Interface {
|
||||||
|
return v1.New(g.SharedInformerFactory)
|
||||||
|
}
|
@@ -0,0 +1,40 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = [
|
||||||
|
"interface.go",
|
||||||
|
"networkpolicy.go",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/apis/networking/v1:go_default_library",
|
||||||
|
"//pkg/client/clientset_generated/clientset:go_default_library",
|
||||||
|
"//pkg/client/informers/informers_generated/externalversions/internalinterfaces:go_default_library",
|
||||||
|
"//pkg/client/listers/networking/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/runtime:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/watch:go_default_library",
|
||||||
|
"//vendor/k8s.io/client-go/tools/cache:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [":package-srcs"],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
@@ -0,0 +1,43 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This file was automatically generated by informer-gen
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
import (
|
||||||
|
internalinterfaces "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/internalinterfaces"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Interface provides access to all the informers in this group version.
|
||||||
|
type Interface interface {
|
||||||
|
// NetworkPolicies returns a NetworkPolicyInformer.
|
||||||
|
NetworkPolicies() NetworkPolicyInformer
|
||||||
|
}
|
||||||
|
|
||||||
|
type version struct {
|
||||||
|
internalinterfaces.SharedInformerFactory
|
||||||
|
}
|
||||||
|
|
||||||
|
// New returns a new Interface.
|
||||||
|
func New(f internalinterfaces.SharedInformerFactory) Interface {
|
||||||
|
return &version{f}
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicies returns a NetworkPolicyInformer.
|
||||||
|
func (v *version) NetworkPolicies() NetworkPolicyInformer {
|
||||||
|
return &networkPolicyInformer{factory: v.SharedInformerFactory}
|
||||||
|
}
|
@@ -0,0 +1,68 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This file was automatically generated by informer-gen
|
||||||
|
|
||||||
|
package v1
|
||||||
|
|
||||||
|
import (
|
||||||
|
meta_v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
cache "k8s.io/client-go/tools/cache"
|
||||||
|
networking_v1 "k8s.io/kubernetes/pkg/apis/networking/v1"
|
||||||
|
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
||||||
|
internalinterfaces "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions/internalinterfaces"
|
||||||
|
v1 "k8s.io/kubernetes/pkg/client/listers/networking/v1"
|
||||||
|
time "time"
|
||||||
|
)
|
||||||
|
|
||||||
|
// NetworkPolicyInformer provides access to a shared informer and lister for
|
||||||
|
// NetworkPolicies.
|
||||||
|
type NetworkPolicyInformer interface {
|
||||||
|
Informer() cache.SharedIndexInformer
|
||||||
|
Lister() v1.NetworkPolicyLister
|
||||||
|
}
|
||||||
|
|
||||||
|
type networkPolicyInformer struct {
|
||||||
|
factory internalinterfaces.SharedInformerFactory
|
||||||
|
}
|
||||||
|
|
||||||
|
func newNetworkPolicyInformer(client clientset.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer {
|
||||||
|
sharedIndexInformer := cache.NewSharedIndexInformer(
|
||||||
|
&cache.ListWatch{
|
||||||
|
ListFunc: func(options meta_v1.ListOptions) (runtime.Object, error) {
|
||||||
|
return client.NetworkingV1().NetworkPolicies(meta_v1.NamespaceAll).List(options)
|
||||||
|
},
|
||||||
|
WatchFunc: func(options meta_v1.ListOptions) (watch.Interface, error) {
|
||||||
|
return client.NetworkingV1().NetworkPolicies(meta_v1.NamespaceAll).Watch(options)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&networking_v1.NetworkPolicy{},
|
||||||
|
resyncPeriod,
|
||||||
|
cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc},
|
||||||
|
)
|
||||||
|
|
||||||
|
return sharedIndexInformer
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *networkPolicyInformer) Informer() cache.SharedIndexInformer {
|
||||||
|
return f.factory.InformerFor(&networking_v1.NetworkPolicy{}, newNetworkPolicyInformer)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *networkPolicyInformer) Lister() v1.NetworkPolicyLister {
|
||||||
|
return v1.NewNetworkPolicyLister(f.Informer().GetIndexer())
|
||||||
|
}
|
@@ -22,6 +22,7 @@ go_library(
|
|||||||
"//pkg/apis/batch:go_default_library",
|
"//pkg/apis/batch:go_default_library",
|
||||||
"//pkg/apis/certificates:go_default_library",
|
"//pkg/apis/certificates:go_default_library",
|
||||||
"//pkg/apis/extensions:go_default_library",
|
"//pkg/apis/extensions:go_default_library",
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
"//pkg/apis/policy:go_default_library",
|
"//pkg/apis/policy:go_default_library",
|
||||||
"//pkg/apis/rbac:go_default_library",
|
"//pkg/apis/rbac:go_default_library",
|
||||||
"//pkg/apis/settings:go_default_library",
|
"//pkg/apis/settings:go_default_library",
|
||||||
@@ -35,6 +36,7 @@ go_library(
|
|||||||
"//pkg/client/informers/informers_generated/internalversion/core:go_default_library",
|
"//pkg/client/informers/informers_generated/internalversion/core:go_default_library",
|
||||||
"//pkg/client/informers/informers_generated/internalversion/extensions:go_default_library",
|
"//pkg/client/informers/informers_generated/internalversion/extensions:go_default_library",
|
||||||
"//pkg/client/informers/informers_generated/internalversion/internalinterfaces:go_default_library",
|
"//pkg/client/informers/informers_generated/internalversion/internalinterfaces:go_default_library",
|
||||||
|
"//pkg/client/informers/informers_generated/internalversion/networking:go_default_library",
|
||||||
"//pkg/client/informers/informers_generated/internalversion/policy:go_default_library",
|
"//pkg/client/informers/informers_generated/internalversion/policy:go_default_library",
|
||||||
"//pkg/client/informers/informers_generated/internalversion/rbac:go_default_library",
|
"//pkg/client/informers/informers_generated/internalversion/rbac:go_default_library",
|
||||||
"//pkg/client/informers/informers_generated/internalversion/settings:go_default_library",
|
"//pkg/client/informers/informers_generated/internalversion/settings:go_default_library",
|
||||||
@@ -64,6 +66,7 @@ filegroup(
|
|||||||
"//pkg/client/informers/informers_generated/internalversion/core:all-srcs",
|
"//pkg/client/informers/informers_generated/internalversion/core:all-srcs",
|
||||||
"//pkg/client/informers/informers_generated/internalversion/extensions:all-srcs",
|
"//pkg/client/informers/informers_generated/internalversion/extensions:all-srcs",
|
||||||
"//pkg/client/informers/informers_generated/internalversion/internalinterfaces:all-srcs",
|
"//pkg/client/informers/informers_generated/internalversion/internalinterfaces:all-srcs",
|
||||||
|
"//pkg/client/informers/informers_generated/internalversion/networking:all-srcs",
|
||||||
"//pkg/client/informers/informers_generated/internalversion/policy:all-srcs",
|
"//pkg/client/informers/informers_generated/internalversion/policy:all-srcs",
|
||||||
"//pkg/client/informers/informers_generated/internalversion/rbac:all-srcs",
|
"//pkg/client/informers/informers_generated/internalversion/rbac:all-srcs",
|
||||||
"//pkg/client/informers/informers_generated/internalversion/settings:all-srcs",
|
"//pkg/client/informers/informers_generated/internalversion/settings:all-srcs",
|
||||||
|
@@ -31,6 +31,7 @@ import (
|
|||||||
core "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/core"
|
core "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/core"
|
||||||
extensions "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/extensions"
|
extensions "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/extensions"
|
||||||
internalinterfaces "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/internalinterfaces"
|
internalinterfaces "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/internalinterfaces"
|
||||||
|
networking "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/networking"
|
||||||
policy "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/policy"
|
policy "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/policy"
|
||||||
rbac "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/rbac"
|
rbac "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/rbac"
|
||||||
settings "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/settings"
|
settings "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/settings"
|
||||||
@@ -127,6 +128,7 @@ type SharedInformerFactory interface {
|
|||||||
Certificates() certificates.Interface
|
Certificates() certificates.Interface
|
||||||
Core() core.Interface
|
Core() core.Interface
|
||||||
Extensions() extensions.Interface
|
Extensions() extensions.Interface
|
||||||
|
Networking() networking.Interface
|
||||||
Policy() policy.Interface
|
Policy() policy.Interface
|
||||||
Rbac() rbac.Interface
|
Rbac() rbac.Interface
|
||||||
Settings() settings.Interface
|
Settings() settings.Interface
|
||||||
@@ -161,6 +163,10 @@ func (f *sharedInformerFactory) Extensions() extensions.Interface {
|
|||||||
return extensions.New(f)
|
return extensions.New(f)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (f *sharedInformerFactory) Networking() networking.Interface {
|
||||||
|
return networking.New(f)
|
||||||
|
}
|
||||||
|
|
||||||
func (f *sharedInformerFactory) Policy() policy.Interface {
|
func (f *sharedInformerFactory) Policy() policy.Interface {
|
||||||
return policy.New(f)
|
return policy.New(f)
|
||||||
}
|
}
|
||||||
|
@@ -29,6 +29,7 @@ import (
|
|||||||
batch "k8s.io/kubernetes/pkg/apis/batch"
|
batch "k8s.io/kubernetes/pkg/apis/batch"
|
||||||
certificates "k8s.io/kubernetes/pkg/apis/certificates"
|
certificates "k8s.io/kubernetes/pkg/apis/certificates"
|
||||||
extensions "k8s.io/kubernetes/pkg/apis/extensions"
|
extensions "k8s.io/kubernetes/pkg/apis/extensions"
|
||||||
|
networking "k8s.io/kubernetes/pkg/apis/networking"
|
||||||
policy "k8s.io/kubernetes/pkg/apis/policy"
|
policy "k8s.io/kubernetes/pkg/apis/policy"
|
||||||
rbac "k8s.io/kubernetes/pkg/apis/rbac"
|
rbac "k8s.io/kubernetes/pkg/apis/rbac"
|
||||||
settings "k8s.io/kubernetes/pkg/apis/settings"
|
settings "k8s.io/kubernetes/pkg/apis/settings"
|
||||||
@@ -137,6 +138,10 @@ func (f *sharedInformerFactory) ForResource(resource schema.GroupVersionResource
|
|||||||
case extensions.SchemeGroupVersion.WithResource("thirdpartyresources"):
|
case extensions.SchemeGroupVersion.WithResource("thirdpartyresources"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Extensions().InternalVersion().ThirdPartyResources().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Extensions().InternalVersion().ThirdPartyResources().Informer()}, nil
|
||||||
|
|
||||||
|
// Group=Networking, Version=InternalVersion
|
||||||
|
case networking.SchemeGroupVersion.WithResource("networkpolicies"):
|
||||||
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Networking().InternalVersion().NetworkPolicies().Informer()}, nil
|
||||||
|
|
||||||
// Group=Policy, Version=InternalVersion
|
// Group=Policy, Version=InternalVersion
|
||||||
case policy.SchemeGroupVersion.WithResource("poddisruptionbudgets"):
|
case policy.SchemeGroupVersion.WithResource("poddisruptionbudgets"):
|
||||||
return &genericInformer{resource: resource.GroupResource(), informer: f.Policy().InternalVersion().PodDisruptionBudgets().Informer()}, nil
|
return &genericInformer{resource: resource.GroupResource(), informer: f.Policy().InternalVersion().PodDisruptionBudgets().Informer()}, nil
|
||||||
|
@@ -0,0 +1,34 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = ["interface.go"],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/client/informers/informers_generated/internalversion/internalinterfaces:go_default_library",
|
||||||
|
"//pkg/client/informers/informers_generated/internalversion/networking/internalversion:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [
|
||||||
|
":package-srcs",
|
||||||
|
"//pkg/client/informers/informers_generated/internalversion/networking/internalversion:all-srcs",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
@@ -0,0 +1,44 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This file was automatically generated by informer-gen
|
||||||
|
|
||||||
|
package networking
|
||||||
|
|
||||||
|
import (
|
||||||
|
internalinterfaces "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/internalinterfaces"
|
||||||
|
internalversion "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/networking/internalversion"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Interface provides access to each of this group's versions.
|
||||||
|
type Interface interface {
|
||||||
|
// InternalVersion provides access to shared informers for resources in InternalVersion.
|
||||||
|
InternalVersion() internalversion.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type group struct {
|
||||||
|
internalinterfaces.SharedInformerFactory
|
||||||
|
}
|
||||||
|
|
||||||
|
// New returns a new Interface.
|
||||||
|
func New(f internalinterfaces.SharedInformerFactory) Interface {
|
||||||
|
return &group{f}
|
||||||
|
}
|
||||||
|
|
||||||
|
// InternalVersion returns a new internalversion.Interface.
|
||||||
|
func (g *group) InternalVersion() internalversion.Interface {
|
||||||
|
return internalversion.New(g.SharedInformerFactory)
|
||||||
|
}
|
@@ -0,0 +1,40 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = [
|
||||||
|
"interface.go",
|
||||||
|
"networkpolicy.go",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
|
"//pkg/client/clientset_generated/internalclientset:go_default_library",
|
||||||
|
"//pkg/client/informers/informers_generated/internalversion/internalinterfaces:go_default_library",
|
||||||
|
"//pkg/client/listers/networking/internalversion:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/runtime:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/watch:go_default_library",
|
||||||
|
"//vendor/k8s.io/client-go/tools/cache:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [":package-srcs"],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
@@ -0,0 +1,43 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This file was automatically generated by informer-gen
|
||||||
|
|
||||||
|
package internalversion
|
||||||
|
|
||||||
|
import (
|
||||||
|
internalinterfaces "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/internalinterfaces"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Interface provides access to all the informers in this group version.
|
||||||
|
type Interface interface {
|
||||||
|
// NetworkPolicies returns a NetworkPolicyInformer.
|
||||||
|
NetworkPolicies() NetworkPolicyInformer
|
||||||
|
}
|
||||||
|
|
||||||
|
type version struct {
|
||||||
|
internalinterfaces.SharedInformerFactory
|
||||||
|
}
|
||||||
|
|
||||||
|
// New returns a new Interface.
|
||||||
|
func New(f internalinterfaces.SharedInformerFactory) Interface {
|
||||||
|
return &version{f}
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicies returns a NetworkPolicyInformer.
|
||||||
|
func (v *version) NetworkPolicies() NetworkPolicyInformer {
|
||||||
|
return &networkPolicyInformer{factory: v.SharedInformerFactory}
|
||||||
|
}
|
@@ -0,0 +1,68 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This file was automatically generated by informer-gen
|
||||||
|
|
||||||
|
package internalversion
|
||||||
|
|
||||||
|
import (
|
||||||
|
v1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
runtime "k8s.io/apimachinery/pkg/runtime"
|
||||||
|
watch "k8s.io/apimachinery/pkg/watch"
|
||||||
|
cache "k8s.io/client-go/tools/cache"
|
||||||
|
networking "k8s.io/kubernetes/pkg/apis/networking"
|
||||||
|
internalclientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
|
||||||
|
internalinterfaces "k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/internalinterfaces"
|
||||||
|
internalversion "k8s.io/kubernetes/pkg/client/listers/networking/internalversion"
|
||||||
|
time "time"
|
||||||
|
)
|
||||||
|
|
||||||
|
// NetworkPolicyInformer provides access to a shared informer and lister for
|
||||||
|
// NetworkPolicies.
|
||||||
|
type NetworkPolicyInformer interface {
|
||||||
|
Informer() cache.SharedIndexInformer
|
||||||
|
Lister() internalversion.NetworkPolicyLister
|
||||||
|
}
|
||||||
|
|
||||||
|
type networkPolicyInformer struct {
|
||||||
|
factory internalinterfaces.SharedInformerFactory
|
||||||
|
}
|
||||||
|
|
||||||
|
func newNetworkPolicyInformer(client internalclientset.Interface, resyncPeriod time.Duration) cache.SharedIndexInformer {
|
||||||
|
sharedIndexInformer := cache.NewSharedIndexInformer(
|
||||||
|
&cache.ListWatch{
|
||||||
|
ListFunc: func(options v1.ListOptions) (runtime.Object, error) {
|
||||||
|
return client.Networking().NetworkPolicies(v1.NamespaceAll).List(options)
|
||||||
|
},
|
||||||
|
WatchFunc: func(options v1.ListOptions) (watch.Interface, error) {
|
||||||
|
return client.Networking().NetworkPolicies(v1.NamespaceAll).Watch(options)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&networking.NetworkPolicy{},
|
||||||
|
resyncPeriod,
|
||||||
|
cache.Indexers{cache.NamespaceIndex: cache.MetaNamespaceIndexFunc},
|
||||||
|
)
|
||||||
|
|
||||||
|
return sharedIndexInformer
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *networkPolicyInformer) Informer() cache.SharedIndexInformer {
|
||||||
|
return f.factory.InformerFor(&networking.NetworkPolicy{}, newNetworkPolicyInformer)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *networkPolicyInformer) Lister() internalversion.NetworkPolicyLister {
|
||||||
|
return internalversion.NewNetworkPolicyLister(f.Informer().GetIndexer())
|
||||||
|
}
|
36
pkg/client/listers/networking/internalversion/BUILD
Normal file
36
pkg/client/listers/networking/internalversion/BUILD
Normal file
@@ -0,0 +1,36 @@
|
|||||||
|
package(default_visibility = ["//visibility:public"])
|
||||||
|
|
||||||
|
licenses(["notice"])
|
||||||
|
|
||||||
|
load(
|
||||||
|
"@io_bazel_rules_go//go:def.bzl",
|
||||||
|
"go_library",
|
||||||
|
)
|
||||||
|
|
||||||
|
go_library(
|
||||||
|
name = "go_default_library",
|
||||||
|
srcs = [
|
||||||
|
"expansion_generated.go",
|
||||||
|
"networkpolicy.go",
|
||||||
|
],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
deps = [
|
||||||
|
"//pkg/apis/networking:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/api/errors:go_default_library",
|
||||||
|
"//vendor/k8s.io/apimachinery/pkg/labels:go_default_library",
|
||||||
|
"//vendor/k8s.io/client-go/tools/cache:go_default_library",
|
||||||
|
],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "package-srcs",
|
||||||
|
srcs = glob(["**"]),
|
||||||
|
tags = ["automanaged"],
|
||||||
|
visibility = ["//visibility:private"],
|
||||||
|
)
|
||||||
|
|
||||||
|
filegroup(
|
||||||
|
name = "all-srcs",
|
||||||
|
srcs = [":package-srcs"],
|
||||||
|
tags = ["automanaged"],
|
||||||
|
)
|
@@ -0,0 +1,27 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This file was automatically generated by lister-gen
|
||||||
|
|
||||||
|
package internalversion
|
||||||
|
|
||||||
|
// NetworkPolicyListerExpansion allows custom methods to be added to
|
||||||
|
// NetworkPolicyLister.
|
||||||
|
type NetworkPolicyListerExpansion interface{}
|
||||||
|
|
||||||
|
// NetworkPolicyNamespaceListerExpansion allows custom methods to be added to
|
||||||
|
// NetworkPolicyNamespaceLister.
|
||||||
|
type NetworkPolicyNamespaceListerExpansion interface{}
|
@@ -0,0 +1,94 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// This file was automatically generated by lister-gen
|
||||||
|
|
||||||
|
package internalversion
|
||||||
|
|
||||||
|
import (
|
||||||
|
"k8s.io/apimachinery/pkg/api/errors"
|
||||||
|
"k8s.io/apimachinery/pkg/labels"
|
||||||
|
"k8s.io/client-go/tools/cache"
|
||||||
|
networking "k8s.io/kubernetes/pkg/apis/networking"
|
||||||
|
)
|
||||||
|
|
||||||
|
// NetworkPolicyLister helps list NetworkPolicies.
|
||||||
|
type NetworkPolicyLister interface {
|
||||||
|
// List lists all NetworkPolicies in the indexer.
|
||||||
|
List(selector labels.Selector) (ret []*networking.NetworkPolicy, err error)
|
||||||
|
// NetworkPolicies returns an object that can list and get NetworkPolicies.
|
||||||
|
NetworkPolicies(namespace string) NetworkPolicyNamespaceLister
|
||||||
|
NetworkPolicyListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// networkPolicyLister implements the NetworkPolicyLister interface.
|
||||||
|
type networkPolicyLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewNetworkPolicyLister returns a new NetworkPolicyLister.
|
||||||
|
func NewNetworkPolicyLister(indexer cache.Indexer) NetworkPolicyLister {
|
||||||
|
return &networkPolicyLister{indexer: indexer}
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all NetworkPolicies in the indexer.
|
||||||
|
func (s *networkPolicyLister) List(selector labels.Selector) (ret []*networking.NetworkPolicy, err error) {
|
||||||
|
err = cache.ListAll(s.indexer, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*networking.NetworkPolicy))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicies returns an object that can list and get NetworkPolicies.
|
||||||
|
func (s *networkPolicyLister) NetworkPolicies(namespace string) NetworkPolicyNamespaceLister {
|
||||||
|
return networkPolicyNamespaceLister{indexer: s.indexer, namespace: namespace}
|
||||||
|
}
|
||||||
|
|
||||||
|
// NetworkPolicyNamespaceLister helps list and get NetworkPolicies.
|
||||||
|
type NetworkPolicyNamespaceLister interface {
|
||||||
|
// List lists all NetworkPolicies in the indexer for a given namespace.
|
||||||
|
List(selector labels.Selector) (ret []*networking.NetworkPolicy, err error)
|
||||||
|
// Get retrieves the NetworkPolicy from the indexer for a given namespace and name.
|
||||||
|
Get(name string) (*networking.NetworkPolicy, error)
|
||||||
|
NetworkPolicyNamespaceListerExpansion
|
||||||
|
}
|
||||||
|
|
||||||
|
// networkPolicyNamespaceLister implements the NetworkPolicyNamespaceLister
|
||||||
|
// interface.
|
||||||
|
type networkPolicyNamespaceLister struct {
|
||||||
|
indexer cache.Indexer
|
||||||
|
namespace string
|
||||||
|
}
|
||||||
|
|
||||||
|
// List lists all NetworkPolicies in the indexer for a given namespace.
|
||||||
|
func (s networkPolicyNamespaceLister) List(selector labels.Selector) (ret []*networking.NetworkPolicy, err error) {
|
||||||
|
err = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) {
|
||||||
|
ret = append(ret, m.(*networking.NetworkPolicy))
|
||||||
|
})
|
||||||
|
return ret, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get retrieves the NetworkPolicy from the indexer for a given namespace and name.
|
||||||
|
func (s networkPolicyNamespaceLister) Get(name string) (*networking.NetworkPolicy, error) {
|
||||||
|
obj, exists, err := s.indexer.GetByKey(s.namespace + "/" + name)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if !exists {
|
||||||
|
return nil, errors.NewNotFound(networking.Resource("networkpolicy"), name)
|
||||||
|
}
|
||||||
|
return obj.(*networking.NetworkPolicy), nil
|
||||||
|
}
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user